User:Mca12/Books/MC Encyclopedia

From Wikipedia, the free encyclopedia


MC Encyclopedia[edit]

Good to know[edit]

Computer Science
Big data
Cloaking
Create, read, update and delete
Data scraping
DevOps
Portable Executable
Regular expression
Shim (computing)
Software-defined data center
Software-defined storage
Software versioning
Universally unique identifier
Programming
Base64
Eclipse (software)
Git (software)
JavaScript
JQuery
JSON
Lua (programming language)
Node.js
Pastebin
Perl Compatible Regular Expressions
Protocol Buffers
Punycode
Python (programming language)
Ruby (programming language)
Scrum (software development)
Wheel (Unix term)
Networking
6in4
Bandwidth throttling
DHCPv6
Direct Client-to-Client
DNS-based Authentication of Named Entities
DNS Sinkhole
Domain Name System Security Extensions
Extension mechanisms for DNS
Generic Routing Encapsulation
Google Public DNS
Interactive Connectivity Establishment
Internet Relay Chat
IP Flow Information Export
IPv6
IPv6 address
List of DNS record types
List of TCP and UDP port numbers
Looking Glass server
Neighbor Discovery Protocol
NetFlow
Network Functions Virtualization
OpenFlow
Pcap
QUIC
Real Time Messaging Protocol
Real Time Streaming Protocol
Real-time Transport Protocol
Rich Communication Services
Route analytics
Simple Network Management Protocol
Simple Service Discovery Protocol
Software-defined networking
STUN
TCP Fast Open
Teredo tunneling
Traversal Using Relays around NAT
Tunneling protocol
Universal Plug and Play
Wireshark
HTTP/HTML/Web
Akamai Technologies
Content delivery network
Do Not Track
Hypertext Transfer Protocol
HTTP 2.0
HTTP cookie
HTTP ETag
Pingback
Polyfill
SPDY
Steam (software)
Web bug
WebRTC
Exploits/Malware
Blackhole exploit kit
Botnet
Cross-site request forgery
Cross-site scripting
Domain Generation Algorithm
Dropper (malware)
Exploit (computer security)
Fast flux
Fraggle attack
Heap spraying
HTTP tunnel
ICMP tunnel
Kali Linux
Malware
NSTX
Null session
Pharming
Phishing
Shellcode
Shodan (website)
SMS phishing
Smurf attack
Vulnerability (computing)
Windows Metafile vulnerability
Zero-day attack
APT
Advanced persistent threat
Cyberweapon
Duqu
Flame (malware)
Stuxnet
Wiper (malware)
Cyber Defence
Computer network operations
Cyberwarfare
Proactive Cyber Defence
Tallinn Manual
Information Security
Anonymizer
Business continuity planning
Computer forensics
Content Security Policy
CVSS
Data Execution Prevention
Data loss prevention software
Digital forensics
Disaster recovery plan
EICAR test file
Indicator of compromise
Information security
Memory protection
Microsoft-specific exception handling mechanisms
Network Behavior Anomaly Detection
Network forensics
Security Content Automation Protocol
Security information and event management
Sender Policy Framework
Taint checking
Unified threat management
Cryptography
Cryptographic nonce
Kerberos (protocol)
Perfect forward secrecy
Off-the-Record Messaging
OAuth
Online Certificate Status Protocol
Salt (cryptography)
Transport Layer Security
Reverse Engineering
Address space layout randomization
NOP slide
Obfuscation (software)
Return-oriented programming
X86 calling conventions