hacking back

0001-01-01

Hacking back is a technique to counter cybercrime by hacking the devices of the attacker.

Read More

hacktivist

0001-01-01

hacktivism is the use of hacking as a form of activism. hacktivism is a portmanteau of hack and activism.

Read More

half guard (BJJ)

0001-01-01

half guard in BJJ and other grappling arts occurs when the bottom player secures one of the top player’s legs by wrapping their own legs around ...

Read More

hand fighting

0001-01-01

In grappling contexts such as BJJ, Judo, and wrestling, hand fighting (or grip fighting) refers to a set of tactics, systems, and techniques used to ...

Read More

Handle

0001-01-01

A handle is an abstract reference value to a resource, often memory or an open file, named pipe, socket, etc.

These are similar to file descriptors ...

Read More

handle.exe

0001-01-01 sysinternals windows

handle.exe is a tool provided by the Sysinternals Suite that lists handles opened by processes. It may also be used to close open handles for malware ...

Read More

hands-on-keyboard

0001-01-01

A hands-on-keyboard attack is a cyberattack in which the attacker is actively and manually performing activities on compromised assets rather than ...

Read More

hard drive

0001-01-01

A hard drive is a non-volatile (data is retained even if powered off) device used to store data on a computer system.

Read More

hard-coded

0001-01-01

hard coding in the context of computer programming is embedding data directly into the source code or an executable object. Hard-coded data typically ...

Read More

hard-coded passwords

0001-01-01

Computer programs often contain hard-coded passwords within their binary files and objects. Hard-coded data typically requires program modification or ...

Read More