Ken Thompson

0001-01-01

Kenneth Lane Thompson is an American computer scientist who is credited with implementing the original Unix operating system, the B programming ...

Read More

Kerberos

0001-01-01

Kerberos is a network authentication protocol that uses cryptography and a key distribution center (KDC) to verify user identities and facilitate ...

Read More

kernel

0001-01-01

A kernel is the core of a computer’s operating system.

Read More

kernel32.dll

0001-01-01

Kernel32.dll exposes most of the basic WinAPI functionality such as memory management, i/o, process and thread creation, etc.

Many functions within ...

Read More

kettlebells

0001-01-01

Kettlebells are a type of weight resembling a flat-based cannonball with a handle.

Kettlebells are commonly used for strength and endurance training.

Read More

Kevin Mitnick

0001-01-01

Kevin David Mitnick (August 6, 1963 - July 16, 2023) was an American author, cybersecurity consultant, and hacker. ...

Read More

keyboard

0001-01-01

A keyboard is an input device perhipheral that allows users to type letters, numbers, and symbols into a computer.

Read More

keylogger

0001-01-01

a keylogger is a type of malware that logs the keystrokes entered on a victim machine for the future perusal of an attacker. Keylogger malware is ...

Read More

keyloggers and screenshots are very effective offensive tools

0001-01-01

keyloggers and screenshots can be very potent offensive security tools that enable the attacker to gain information that would be otherwise difficult ...

Read More

keys and passwords as attribution

0001-01-01

Malware authors often employ cryptographic keys or passwords in order to secure their payloads.

Often, these sensitive pieces of information are ...

Read More