Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
l
- Logic Flaw Description: A logical flaw refers to an error in the design or implementation of a system that can be exploited to gain unauthorized access or(...) Read more
- Liveness detection Description: Liveness detection is a technique used in biometric authentication that ensures that the provided sample comes from a living(...) Read more
- Lurking Attack Description: A Lurking Attack is a type of intrusion in the field of network security, where an attacker secretly observes and collects(...) Read more
- Local Exploit Description: Local exploitation is a type of cyber attack that requires physical or local access to the target system to be carried out. Unlike(...) Read more
- LDAP Injection Description: LDAP injection is a type of attack that exploits vulnerabilities in applications that use LDAP (Lightweight Directory Access(...) Read more
- LFI (Local File Inclusion) Description: Local File Inclusion (LFI) is a security vulnerability that allows an attacker to include files on a server through a web browser.(...) Read more
- Link Spoofing Description: Link spoofing is a technique used to redirect users to a malicious site by disguising the real URL. This practice relies on(...) Read more
- L2TP (Layer 2 Tunneling Protocol) Description: L2TP (Layer 2 Tunneling Protocol) is a network protocol that allows the creation of virtual tunnels for data transmission over IP(...) Read more
- Lurker Description: A lurker is a type of malware that silently observes and collects data without being detected. This malicious software infiltrates(...) Read more
- Layer 7 Attack Description: Layer 7 attack refers to a type of cyber attack that specifically targets the application layer of the OSI (Open Systems(...) Read more
- L2 Switch Description: A Layer 2 switch is a networking device that operates at the second layer of the OSI model, specifically the data link layer. Its(...) Read more
- L2TP/IPsec **Description:** L2TP/IPsec is a protocol that combines Layer 2 Tunneling Protocol (L2TP) and Internet Protocol Security (IPsec) to provide a(...) Read more
- Linear Cryptanalysis Description: Linear cryptanalysis is an attack method used to break block ciphers, based on approximating the relationship between plaintext,(...) Read more
- Lattice-Based Cryptography Description: Lattice-based cryptography is an approach to cryptography that is based on the difficulty of solving mathematical problems related(...) Read more
- LFSR (Linear Feedback Shift Register) Description: A Linear Feedback Shift Register (LFSR) is a type of shift register that generates a sequence of bits from its previous state using(...) Read more