Ken Thompson
0001-01-01
Kenneth Lane Thompson is an American computer scientist who is credited with implementing the original Unix operating system, the B programming ...
Read More
Kerberos
0001-01-01
Kerberos is a network authentication protocol that uses cryptography and a key distribution center (KDC) to verify user identities and facilitate ...
Read More
kernel
0001-01-01
A kernel is the core of a computer’s operating system.
Read More
kernel32.dll
0001-01-01
Kernel32.dll exposes most of the basic WinAPI functionality such as memory management, i/o, process and thread creation, etc.
Many functions within ...
Read More
kettlebells
0001-01-01
Kettlebells are a type of weight resembling a flat-based cannonball with a handle.
Kettlebells are commonly used for strength and endurance training.
Read More
Kevin Mitnick
0001-01-01
Kevin David Mitnick (August 6, 1963 - July 16, 2023) was an American author, cybersecurity consultant, and hacker. ...
Read More
keyboard
0001-01-01
A keyboard is an input device perhipheral that allows users to type letters, numbers, and symbols into a computer.
Read More
keylogger
0001-01-01
a keylogger is a type of malware that logs the keystrokes entered on a victim machine for the future perusal of an attacker. Keylogger malware is ...
Read More
keyloggers and screenshots are very effective offensive tools
0001-01-01
keyloggers and screenshots can be very potent offensive security tools that enable the attacker to gain information that would be otherwise difficult ...
Read More
keys and passwords as attribution
0001-01-01
Malware authors often employ cryptographic keys or passwords in order to secure their payloads.
Often, these sensitive pieces of information are ...
Read More