Proxy Trojan
A type of Trojan horse designed to use the victim’s computer as a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use your system to launch malicious attacks against other networks.
Read Also:
- Protocol-Independent Multicast
Abbreviated PIM, a multicasting routing protocol that runs over an existing unicast infrastructure. There are two variations of PIM: PIM-SM — Short for PIM-Sparse Mode, which is used when recipients are scattered over a large area. PIM-DM — Short for PIM-Dense Mode, which is used when the targeted recipients are in a concentrated area.
- PuTTY
A free Telnet and SSH terminal software for Windows and Unix platforms that enables users to remotely access computers over the Internet. PuTTY was written by Simon Tatham.
- Public PAD
Provided by the Post Telephone and Telegraph (PTT) administration or network provider that you can access by a local call on the public switched network. Once your terminal is connected to the public PAD, you enter the NUA of your host DTE and the PAD establishes the communications. [Source: IBM Information center]
- Punycode
As defined by RFC 3492, Punycode is a simple and efficient transfer encoding syntax designed for use with Internationalized Domain Names in Applications (IDNA). It uniquely and reversibly transforms a Unicode string into an ASCII string. ASCII characters in the Unicode string are represented literally, and nonSCII characters are represented by ASCII characters that are […]
- PureVideo
A trademark of NVIDIA Corporation, PureVideo technology is the combination of a high-definition video processing core on the NVIDIA GPU and software that is used to play ultra-smooth movies with minimal CPU use and low power consumption. NVIDIA PureVideo is supported in the following NVIDIA products; GeForce, GeForce M (formerly known as GeForce Go), and […]