User's Manual Part 2

Hacking
Glossary of Terms 301
H
Hacking
An activity in which someone
breaks into someone else's
computer system, bypasses
passwords or licenses in
computer programs; or in other
ways intentionally breaches
computer security. The end
result is that whatever resides on
the computer can be viewed and
sensitive data can be stolen
without anyone knowing about
it. Sometimes, tiny programs are
'planted' on the computer that are
designed to watch out for, seize
and then transmit to another
computer, specific types of data.
HTTPS
Hypertext Transfer Protocol over
Secure Socket Layer, or HTTP
over SSL.
A protocol for accessing a secure
Web server. It uses SSL as a
sublayer under the regular HTTP
application. This directs
messages to a secure port
number rather than the default
Web port number, and uses a
public key to encrypt data
HTTPS is used to transfer
confidential user information.
Hub
A device with multiple ports,
connecting several PCs or
network devices on a network.
I
IP Address
An IP address is a 32-bit number
that identifies each computer
sending or receiving data packets
across the Internet. When you
request an HTML page or send
e-mail, the Internet Protocol part
of TCP/IP includes your IP
address in the message and sends
it to the IP address that is
obtained by looking up the
domain name in the Uniform
Resource Locator you requested
or in the e-mail address you're
sending a note to. At the other
end, the recipient can see the IP
address of the Web page
requestor or the e-mail sender
and can respond by sending
another message using the IP
address it received.
IP Spoofing
A technique where an attacker
attempts to gain unauthorized
access through a false source
address to make it appear as
though communications have
originated in a part of the
network with higher access
privileges. For example, a packet
originating on the Internet may