Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
b
- Browser Sandbox Description: The browser 'sandbox' is a security mechanism designed to isolate running programs, especially those executed in a web environment,(...) Read more
- Brute Force Password Cracking Description: Password cracking by brute force is a decryption method that involves trying all possible combinations of characters until the(...) Read more
- Business Logic Attack Description: Business logic attack is a hacking technique that focuses on exploiting weaknesses in the logic of a business process to manipulate(...) Read more
- Brute Force Cracking Description: Brute force decryption is a method of cyber attack that involves systematically checking all possible passwords or keys until the(...) Read more
- Black Box Testing Description: Black box testing is an evaluation method where the tester has no prior knowledge of the internal workings of the application or(...) Read more
- Business Logic Flaw Description: Business logic flaw is a vulnerability that arises from incorrect assumptions in the business logic of an application. This can(...) Read more
- Bot Attack Description: A bot attack is a type of cyber attack that uses automated scripts or bots to perform malicious actions on a system or network.(...) Read more
- Buffer Underflow Description: Buffer underflow is an error that occurs when data is read from a buffer before it has been fully populated. This phenomenon occurs(...) Read more
- Brute Force Tool Description: A brute force tool is software designed to perform brute force attacks on passwords or encryptions. This type of tool attempts all(...) Read more
- Backtracking Algorithm Description: The backtracking algorithm is a problem-solving technique that explores all possible options to find an optimal solution. Its(...) Read more
- Bot Identification Description: Bot identification is the process of determining whether a user interacting with a system is human or an automated bot. This(...) Read more
- Blowfish Description: Blowfish is a symmetric key block cipher algorithm designed by Bruce Schneier in 1993. This cipher is characterized by its speed(...) Read more
- Base64 Description: Base64 is an encoding scheme that transforms binary data into an ASCII text format, allowing the representation of information in a(...) Read more
- Bcrypt Description: Bcrypt is a password hashing function designed for the secure storage of passwords. It is based on the Blowfish algorithm and is(...) Read more
- Bipartite Graph Description: A bipartite graph is a mathematical structure characterized by having its vertices divided into two disjoint sets, such that each(...) Read more