Do not use in formal writing. Try exploit, access, steal, or a more context-specific verb. In old-school discussions, hacking vs. cracking was an important distinction between the exploratory intent of hackers accessing systems without authorization vs. the often criminal intent of crackers accessing and damaging those same systems.
Do not use in formal writing. Use attacker, external threat, malicious user, consultant, security researcher, data scientist, or their job title, depending on the context.
A vulnerability coordination and bug bounty platform.
An unofficial title for the grouping of security conferences in Las Vegas every year in late summer.
Related:
A fictional AI from 2001: A Space Odyssey.
Related:
When a server or computer hangs, it is nonresponsive. If the requesting computer gives up waiting for a response, it times out.
Related:
If it’s a type of drive, use the normal font, as in “SATA drive.” If discussing a drive by name, use the tech font, as in “the C:
drive.”
To configure applications, systems, or services in a more secure manner, often using common guidelines.
Related:
A physical device used in multi-factor authentication, such as a YubiKey fob. Also called a hardware token.
Related:
Related:
Related:
Call the [ # ] character a hashtag when indicating a category. Otherwise it’s a pound sign. To avoid confusion with cryptographic hashes, avoid calling this character a hash.
Ex: #poundsign #octothorpe
High-Definition Multimedia Interface. Do not spell out.
Introductory content or navigational aids at the beginning of a block of data. Headers are also electrical connectors that join hardware components such as chips and circuit boards. For HTTP headers, if it’s a type of header, use the normal font. If it’s a named header, use the tech font, as in “an Origin
header.”
Related:
Related:
Related:
An OpenSSL bug.
Hello World
Traditionally, this is the first program written when learning a programming language.
Related:
Human interface device. The USB Rubber Ducky is a keyboard HID. Spell out on first use.
Related:
Host-based intrusion detection system. Spell out or define on first use. Avoid using the acronym in the plural if possible.
Related:
Describes an account or user with elevated permissions. To avoid ambiguity, use the name of the role or permission instead of this term on first mention.
Related:
Short for high-resolution, as in images or video. Pronounced “high-rezz.” Informal.
Related:
An umbrella term for attacks that take over controls or assume the role of a user and compromise the system. Avoid the verb when possible in formal writing. Try take over or take advantage of instead.
Related:
The Health Insurance Portability and Accountability Act. Pronounced as “hippa.” Spell out on first use.
Related:
Human-in-the-loop. Describes simulations that involve human interaction to modify the automated steps of a process. Spell out on first use.
Hash-based message authentication code. Pronounced as “H-mack.” Do not spell out; briefly define on first use.
Related:
Often used as a prefix when describing decoys or bait used as part of security monitoring.
Ex: honey account, honeypot, honeytoken
Related:
A Twitterbot troll.
Related:
Hackers On Planet Earth. A conference that is typically held every two years in New York City.
A reverse engineering tool.
Related:
Related:
HMAC-based one-time password. Pronounced as letters. Spell out on first use.
Related:
To change out parts of a machine without interrupting the system.
Related:
Related:
Related:
Related:
Ex: We published a how-to. This is how to do it.
A security tool. Pronounced as “H-ping.”
HTTP parameter pollution. Spell out on first use.
Hardware random number generator. Sometimes spelled as HWRNG on Linux systems. Spell out on first use.
Hardware security module. Spell out on first use.
HTTP Strict Transport Security. Spell out on first use.
Hat tip. A way of thanking someone online for being or providing a source. Informal.
Hypertext transfer protocol. Pronounced as letters. Do not spell out.
http://
, https://
No need to include these in URIs unless the presence or lack of secure HTTP is relevant to the narrative.
The first word in an HTTP request. Write in the normal font.
Ex: GET, POST, PUT
Related:
HttpOnly
A flag for protecting HTTP cookies from cross-site scripting attacks.
A group of vulnerabilities in CGI environments that involve the HTTP Proxy
header. It was disclosed in 2016.
Information provided in the first line in an HTTP response. Capitalize HTTP statuses in the normal font as if they were titles. Use quotation marks if they might be confused with nearby text.
Ex: 200 OK, 404 Page Not Found, HTTP 413 Request Entity Too Large, 500 Internal Server Error
A kernel-mode driver.
Simulations that involve human interaction to modify the automated steps of a process. Spell out on first use.
A fictional fast travel system in Star Wars that allows ships to travel into hyperspace at lightspeed.
Related:
Related:
An Intel technology that allows simultaneous processing of multiple tasks on a single CPU core. Also known as simultaneous multithreading. Always spell out.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.