Jump to content

User:Rkadchitre/Books/KnowledgeRK

From Wikipedia, the free encyclopedia


Knowledge

[edit]
.NET Framework
1G
2014 Russian hacker password theft
2G
32-bit computing
3D television
3G
4G
4G-LTE filter
5G
64-bit computing
Aaron Swartz
Abductive reasoning
Accelerometer
Adamantium
Address Resolution Protocol
AdMob
Adobe Flash
AdSense
Advanced Network and Services
Age of the universe
Ajax (programming)
Albert Einstein
ALGOL
Alloy
Alpha particle
Amancio Ortega Gaona
Amateur radio
Amazon.com
Amplitude modulation
Analogy
Analytical chemistry
Ancient Greek
Android (operating system)
Android Lollipop
Android software development
Android Wear
Anonymous (group)
Anti-pattern
Antioxidant
Antivirus software
AOL
Apache HBase
Apache License
APL (programming language)
App Inventor for Android
App Store (iOS)
Apple Inc.
Applied mechanics
Arcade game
Argument
ARM architecture
Artificial intelligence
ASCII
ASP.NET
ASP.NET MVC Framework
Assembly language
Asynchronous Transfer Mode
Attenuation
Audio forensics
Augmented reality
Authentication
Autopsy (software)
Autostereoscopy
Backdoor (computing)
Band gap
Bandwidth (computing)
Base station
Base station subsystem
Base64
Bash (Unix shell)
BASIC
BCS theory
Beaumont–Adams revolver
Bernard Arnault
Bhagavad Gita
Bible
Big Bang
Bill & Melinda Gates Foundation
Bill Gates
Billion laughs
BitLocker
BitTorrent
Bjarne Stroustrup
Black hole
BlackBerry 10
Bloodstain pattern analysis
Blu-ray Disc
BlueHat
Bluetooth
Body identification
Boot sector
Booting
Boring (manufacturing)
Botnet
Branch (computer science)
British Bull Dog revolver
Browser Object Model
Browser security
Buffer over-read
Buffer overflow
Bureau of Indian Standards
Business magnate
C (programming language)
C (programming language)
C++
Cable jetting
Cable television
CAN bus
Capacitor
Capsa
Carlos Slim
Carna botnet
Cascading Style Sheets
CD-ROM
Cell relay
Cellular frequencies
Cellular network
Cellular repeater
Censorship
CERN
CERT Coordination Center
Certification marks in India
Chaos Computer Club
Chemical element
Chief executive officer
Chrome OS
Chromecast
Chromosome
Chronology of the universe
Chroot
Circuit design
Circuit switching
Clickjacking
Cloud computing
Cmd.exe
CNN
CNO cycle
Coaxial cable
Cocaine
Cocoa Touch
Code injection
Common sense
Common Vulnerabilities and Exposures
Comparison of boot loaders
Comparison of C Sharp and Java
Comparison of command shells
Comparison of computer viruses
Comparison of cryptographic hash functions
Comparison of layout engines (HTML5)
Comparison of operating system kernels
Comparison of programming languages
Comparison of programming languages (array)
Comparison of programming languages (basic instructions)
Comparison of programming languages (strings)
Comparison of programming languages (syntax)
Compiler
Complex metallic alloys
Computational criminology
Computer and network surveillance
Computer architecture
Computer crime
Computer engineering
Computer forensics
Computer network
Computer security
Computer virus
Computer worm
Conficker
Confused deputy problem
Connection-oriented communication
Connection-oriented communication
Connectionless communication
Control flow
Core network
Counterinduction
CPU cache
Cracking of wireless networks
Crime
Crime lab
Crimeware
Criticism of Microsoft
Criticism of Windows XP
Cross-platform
Cross-site request forgery
Cross-site scripting
Cross-zone scripting
Cryptanalysis
Cryptographic hash function
Cryptovirology
Cult of the Dead Cow
CVSS
Cyber spying
Cyber Storm Exercise
Cyberterrorism
Cyberwarfare
Dangling pointer
Data corruption
Data Execution Prevention
Data integrity
Data validation
Database forensics
Dazzler (weapon)
Decocidio
Deductive reasoning
DEF CON
Defensive programming
Dempster–Shafer theory
Denial-of-service attack
Dennis Ritchie
Derp (hacker group)
Detection of fire accelerants
Device driver
Digital electronics
Digital forensics
Digital rights management
Digital subscriber line
Direct manipulation interface
Directory traversal attack
Disassembler
Disk enclosure
DNA
DNA nanotechnology
DNA profiling
DNA repair
DNA sequencing
DNA-encoded chemical library
DNS hijacking
DNS spoofing
Document Object Model
Domain Name System
DoubleClick
Drill
Dual mode mobile
Dual SIM
DVD
Dynamic Host Configuration Protocol
Dynamic-link library
Dynamical system
EarthLink
Eavesdropping
EFI System partition
Electrical conductor
Electron
Email injection
Emergency Management Services
Encapsulation (networking)
End-to-end principle
Endianness
Endoscopy
Engineering
Enhanced Data Rates for GSM Evolution
Ericsson
Ethernet
Evaluation strategy
Exclusive or
Executable
Exploit (computer security)
F Sharp (programming language)
Facebook
Femtocell
Fiber laser
Fiddler (software)
File Allocation Table
File system
File Transfer Protocol
Fingerprint
Fire investigation
Firefox
Firefox OS
Firewall (computing)
Flame (malware)
Flowchart
Forbes
Forensic archaeology
Forensic arts
Forensic biology
Forensic chemistry
Forensic data analysis
Forensic engineering
Forensic identification
Forensic materials engineering
Forensic photography
Forensic profiling
Forensic science
Forensic toxicology
Forensic video analysis
Fortran
Fortune (magazine)
Four-dimensional space
Fragging
Framing (World Wide Web)
FreeBSD jail
Freedom of information
Frequency modulation
FTP bounce attack
Functional programming
Functional programming
FuseNet
Gate array
General Packet Radio Service
Genetic engineering
Germany
GetAdmin
Global Internet usage
Global kOS
Global Positioning System
GlobalHell
Glove prints
Gmail
GNU GRUB
Go (programming language)
Goatse Security
Google
Google Analytics
Google Apps for Work
Google Chrome
Google Doodle
Google Energy
Google Nexus
Google Play
Google Search Appliance
Google TV
Google Voice
Google Wallet
Google.org
Goto
Grammar induction
Greek language
Grenade launcher
Grey hat
Grid computing
GSM
Guinness World Records
Gyroscope
Hack (programming language)
Hacker (computer security)
Hacker (hobbyist)
Hacker (programmer subculture)
Hacker (term)
Hacker ethic
Hacker Manifesto
Hacking of consumer electronics
Hacktivism
Hackweiser
Hand grenade
Haptic technology
Hash function
Haskell
Head-mounted display
Header (computing)
Heap overflow
Hexadecimal
High Level Assembly
High Speed Packet Access
High-bandwidth Digital Content Protection
High-definition television
High-level programming language
High-Speed Downlink Packet Access
High-temperature superconductivity
Hinduism
Home network
Honker Union
Host protected area
HTC
HTC Dream
HTML
HTML attribute
HTML element
HTML scripting
HTTP cookie
HTTP Debugger
HTTP header injection
HTTP response splitting
Hydrochloric acid
Hyperlink
Hypertext Transfer Protocol
IBM
ICANN
Identity theft
IEEE 802.11
IEEE 802.11u
IEEE P1906.1
IEEE Standards Association
Illegal number
Index Corporation
India
Inductive logic programming
Inductive programming
Inductive reasoning
Information Processing Language
Infrared
Input/output
Instant messaging
Instruction unit
Integer overflow
Integrated circuit
Integrated circuit design
Integrated Services Digital Network
Intel
Intelligence quotient
Intelligence Quotient (IQ) and Browser Usage
Inter-process communication
Intermetallic
International Mobile Station Equipment Identity
International Organization for Standardization
International Union of Pure and Applied Chemistry
Internet Architecture Board
Internet area network
Internet Assigned Numbers Authority
Internet Control Message Protocol
Internet Engineering Task Force
Internet Explorer
Internet Explorer 6
Internet Explorer 9
Internet layer
Internet Message Access Protocol
Internet privacy
Internet Protocol
Internet protocol suite
Internet Relay Chat
Internet Society
Internet traffic
Internetworking
Interrupt
Intrusion detection system
Intrusion prevention system
IOS
IOS jailbreaking
IP forwarding algorithm
IP forwarding algorithm
IPhone
IPsec
IPv4
IPv6
ISI mark
Island of stability
Jabber.org
Jabber.org
Jack the Ripper
Japan
Java (programming language)
JavaScript
Kernel (operating system)
Kernel Transaction Manager
Key stretching
Keyhole, Inc
Keystroke logging
L0pht
Lakshmi Mittal
Large Hadron Collider
Larry Ellison
Larry Page
Laser
Lateral thinking
Latin
Latitude
LED-backlit LCD display
Legal aspects of computing
Level Seven (hacking group)
Li-Fi
Life (magazine)
Light tank
Light-emitting diode
Lightweight Directory Access Protocol
Like button
Line number
Linker (computing)
Linux
Linux kernel
Linux malware
Lisp (programming language)
List of alloys
List of brazing alloys
List of cocktails
List of computer criminals
List of computer worms
List of countries by IPv4 address allocation
List of countries by number of broadband Internet subscriptions
List of countries by number of Internet hosts
List of domestic submarine communications cables
List of educational programming languages
List of elements
List of features removed in Windows XP
List of Google hoaxes and easter eggs
List of international submarine communications cables
List of IP protocol numbers
List of nuclides
List of programming language researchers
List of songs recorded by Michael Jackson
List of superconductors
List of WLAN channels
LiveCode
Local shared object
Logic
Logical conjunction
Logical consequence
Logical disjunction
Logical positivism
Logical reasoning
Logtalk
Longitude
Low-level programming language
LTE (telecommunication)
LTE Advanced
LulzSec
Luxembourg
Lynis
Mac OS
Machine code
Magnetic levitation
Mahabharata
Mahamrityunjaya Mantra
Malware
Man-in-the-browser
Marcus Hutter
Markup language
Maser
Massachusetts Institute of Technology
Master boot record
Masters of Deception
Mathematica
Mathematical beauty
Mathematical game
Mathematical induction
Mathematical model
Mathematics of general relativity
MATLAB
MD5
Md5sum
Mechanics
Media access control
Memory management
Memory safety
Memristor
Merit Network
Metamorphic code
Metasploit Project
Metropolitan area network
Michael Jackson
Microkernel
Microsoft
Microsoft Windows
Microsoft Windows library files
Milw0rm
Mobile app
Mobile device forensics
Mobile phone signal
Mobile radio telephone
Mobile secure gateway
Mobile television
Modern Greek
Moore's law
Morphine
MOSFET
Motherboard
Mount Olympus
MPEG-2
Mukesh Ambani
Multimedia Messaging Service
Mutation
Mutator method
Myspace
MySQL
Near field communication
Negation
Nessus (software)
Netscape
Network access point
Network Crack Program Hacker Group
Network forensics
Network packet
Network security
Neutron source
Newbie
Next-generation network
Nikto Web Scanner
Nmap
Nokia
Ntdetect.com
NTFS
NTLDR
Nuclear and radiation accidents and incidents
Nuclear engineering
Nuclear fission
Nuclear fuel cycle
Nuclear fusion
Nuclear matter
Nuclear physics
Nuclear reactor physics
NX bit
Objective-C
Odyssey
Online banking
Open Handset Alliance
Open Shortest Path First
Open source
Open standard
Open-world assumption
OpenVAS
Opera (web browser)
Operating system
Optical amplifier
Optical communication
Optical fiber
Optical fiber connector
Optical microscope
Oracle Database
Orthogonal frequency-division multiple access
Orthogonality
Orthography
OS X Mavericks
Outline of the Internet
Overclocking
P.H.I.R.M.
Packet analyzer
Packet loss
Packet switching
PageRank
Paging
Pakistan
Panzerfaust 3
Parsing
Pascal (programming language)
Password cracking
Patch (computing)
Path MTU Discovery
Payload (computing)
Pcap
Peer-to-peer
Penetration test
Periodic table
Perl
Phase modulation
Philanthropy
Photon
PHP
Phreaking
Planner (programming language)
PlayStation 3
PlayStation Jailbreak
Plug and play
Plug-in (computing)
Point-to-Point Protocol
Pointer (computer programming)
Polymorphic code
Polymorphic engine
Pop-up ad
Post Office Protocol
PreScheme
Prices of elements and their compounds
Privilege escalation
Probability
Problem of induction
Process management (computing)
Processor register
Profiling (information science)
Programming language
Programming language theory
Programming languages used in most popular websites
Programming paradigm
Programming style
Promethium
Proprietary software
Prostate cancer
Protected procedure call
Protocol (object-oriented programming)
Proximity sensor
Pseudocode
Public Interest Registry
Public key certificate
Pyramid
Python (programming language)
P–n junction
Qualcomm
Quantum mechanics
Questioned document examination
Quickoffice
Quran
Race condition
Radio frequency
Radio masts and towers
Rama
Ramayana
Real-time operating system
Real-time Transport Protocol
RedHack
Remote Installation Services
Responsible disclosure
Return-oriented programming
Return-to-libc attack
Rifle grenade
RNA
Rocket-propelled grenade
Roman Seleznev
Rooting (Android OS)
Rootkit
Router (computing)
Ruby (programming language)
Ruby on Rails
Rust (programming language)
S60 (software platform)
Salt (cryptography)
Samsung
Sanskrit
Sanskrit literature
Satchel charge
Schrödinger equation
Script kiddie
Secure by design
Secure coding
Secure Shell
Security bug
Sega
Segmentation fault
Selective file dumper
Self-modifying code
Semiconductor
Semiconductor characterization techniques
Series 40
Session fixation
Seven-segment display
Shared source
Shellcode
Sherlock Holmes
Shiva
Shoulder-fired missile
Silicon Valley
Simple Mail Transfer Protocol
Singapore
Skeleton (computer programming)
SOCKS
Softswitch
Software
Software defect indicator
Software-defined protection
Sonic Team
Sony
South Korea
Spacetime
Spain
Spoofing attack
Spyware
SQL injection
Sri Lanka
Stack buffer overflow
Stack Overflow
Stanford University
Star
Statement (computer science)
Stereoscopy
Storage area network
String (computer science)
Strong and weak typing
Structured programming
Stun grenade
Style sheet (web development)
Submarine communications cable
Subnetwork
Sun Microsystems
Super-heavy tank
Superconductivity
Superuser
Sweden
Swift (programming language)
Switch statement
Switched-mode power supply applications
Switzerland
Symbian
Symbol (chemistry)
Syrian Electronic Army
System programming language
Taiwan
TeaMp0isoN
Technology assessment
Telnet
TeslaTeam
TESO
Texas Instruments
Texas Instruments signing key controversy
The Atlantic
The Coroner's Toolkit
The Sleuth Kit
The Unknowns
Three Laws of Robotics
Tim Berners-Lee
Time of check to time of use
Timeline of chemical element discoveries
Timeline of computer security hacker history
Timeline of computer viruses and worms
Timeline of Internet conflicts
TippingPoint
Toxicology
Trace evidence
Transistor
Transistor count
Transistor model
Transmission Control Protocol
Transport Layer Security
Tritium
Trojan horse (computing)
Tunneling protocol
Two-body problem in general relativity
Type inference
Type system
UGNazi
UMTS frequency bands
Uncontrolled format string
Unicode and HTML
Uniform resource locator
United Arab Emirates
United Kingdom
United States
United States Copyright Office
Universal Mobile Telecommunications System
Universe
Unix shell
Unsigned code
Uranium
USB
USB flash drive
User Datagram Protocol
User interface
User operation prohibition
Utility software
Valmiki
Victim blaming
Virtual private network
Visual Basic
Visual Basic (.NET)
Voice over IP
Voltage
Volume boot record
Vulnerability (computing)
Vulnerability assessment
Vulnerability scanner
Vyasa
W-CDMA (UMTS)
W3af
Warren Buffett
Web browser
Web bug
Web colors
Web server
Web storage
Webley Revolver
Website defacement
White hat (computer security)
White hole
Wi-Fi
Wide area network
Wikipedia
WiMAX
Windows 2000
Windows 7
Windows 8
Windows 8.1
Windows 98
Windows Fundamentals for Legacy PCs
Windows ME
Windows NT
Windows NT 4.0
Windows PowerShell
Windows Registry
Windows Runtime
Windows Server 2003
Windows startup process
Windows Store
Windows Task Manager
Windows Vista
Windows Vista startup process
Windows XP
Windows XP editions
World Wide Web
Wormhole
Write buffer
X.25
X86
X86-64
Xbox (console) modchips
Xbox 360
XHTML
XML
XMPP
XSS worm
Zero-day attack
Zero-day virus
ZeroAccess botnet
Zeus
Zeus (Trojan horse)
Zombie cookie