A programming language.
A situation in which the latency in a system allows an attacker to perform actions outside the expected order of operations. These actions race against a system’s internal timing and may give attackers access to sensitive information or the ability to purchase items without spending money.
Related:
Related:
Random access memory. Pronounced as “ram.” Do not spell out.
A Google AI algorithm that helps sort search results.
Malware that threatens to publish or delete data unless a ransom is paid.
.rar
file
Related:
Remote access trojan. Pronounced as “rat.” Spell out on first use.
Write with a colon and no space, as in 32:9.
Risk-based auditing, authentication, or approach. Spell out on first use.
Role-based access control. Spell out on first use.
Numerous Occurrence MOnitoring & Recovery Exploit. An attack that affects the RC4 cipher. RC4 is pronounced as letters and numbers or as “ark-four.” Do not spell out.
Remote code execution. Pronounced as letters or the whole phrase. Spell out on first use.
Related:
rcp
Remote copy. A command in Unix that allows the transfer of files to and from another system over the network.
RCPT
Short for receipt. A command in SMTP.
Remote Desktop Protocol. Do not use as a verb. Pronounced as letters or the whole phrase. Spell out on first use in public-facing documents.
Amazon Relational Database Service. Pronounced as letters or the whole phrase. Spell out on first use.
Related:
Ex: It offers real-time monitoring. Events occur in real time.
Related:
Google’s proprietary CAPTCHA system.
[REDACTED]
Indicates a censored section of code, often passwords or PII. Use the tech font if it’s part of a code snippet. Redact your images by adding black boxes in image editing software outside of your word processor.
Related:
A Linux operating system or the company that made it. The operating system’s full name is Red Hat Enterprise Linux.
Related:
Related:
An open source in-memory key value store.
A future casualty; cannon fodder; a minor character who is likely to die. Originally, auxiliary crew members of the Star Trek Enterprise who often died during missions. Informal.
Related:
A tool used during security assessments.
A type of offensive engagement. Define briefly on first use to clarify your intended meaning.
Related:
To lower the likelihood of an attack. Not synonymous with “mitigate,” which lessens the severity of an attack.
An attack pattern in which a payload is copied verbatim onto a victim’s context.
Related:
A logical group of keys and values in the Windows Registry. Often targeted by attackers to steal hashed credentials.
Ex: System, SAM
Related:
When a previously remediated vulnerability becomes exploitable again.
The process of improving a system to a known good state in which elements of a vulnerability or its impact have been eliminated.
Related:
Related:
Short for repository. Informal.
Related:
If referring to a title or a report in general, capitalize it in the normal font, as in “the Acme Application Assessment 2020 report.” If referring to the specific filename or path, use the tech font.
Related:
Related:
To retroactively change the continuity of a story in a “do-over.” Informal.
Ex: This finding was not retested.
Related:
A reverse engineer. Informal.
rexec
Short for remote execute. Pronounced as “R-exec.”
Radio frequency. Spell out on first use.
The Remote Frame Buffer protocol. Spell out on first use.
Request for Comments. A formal document from the IETF made by a committee and then formally reviewed. For example, the RFC 1918 memorandum assigns private IP addresses. Pronounced as letters. Define on first use in public-facing documents.
Related:
Radio frequency identification card. Do not spell out.
Red Hat Enterprise Linux. Pronounced as “rell.” Spell out on first use.
Related:
Related:
Related:
ripgrep
A search tool used during pen testing. Use the tech font when writing the command.
Related:
Reduced instruction set computer. This architecture is used in some microprocessors. Do not spell out.
The perceived threat of a security weakness based on the business impact, likelihood of exploitation, and cost to mitigate or reduce the threat.
A Bishop Fox tool for exploiting Java services. Pronounced like “army-scout.”
Related:
Rockyou.txt
A large password-cracking dictionary made from a 2009 data breach of the company RockYou.
Related:
To return to a previous version of software that is known to be problem-free due to an issue in the most recent version.
Related:
To gain root-level access. OK to use in formal writing when discussing Android mobile devices. Informal in other uses. When discussing iOS, use jailbreak instead.
Related:
root
(n.)
Use the tech font when referring to a specific root
account or user. Use regular font when referring to a more general instance, such as the root of an XML document or a web root.
Related:
A collection of exploitation tools designed to gain root-level access to a target operating system.
Return-oriented programming. Spell out on first use.
Ruby on Rails. A web application framework. Sometimes just called Rails. Spoken out loud as the whole phrase. Spell out or briefly define on first use.
Related:
This refers to a tech company, an annual San Francisco security convention, and an encryption algorithm. RSA stands for the last names of the three co-founders. Pronounced as letters. Do not spell out. https://www.rsaconference.com/
Related:
rsh
Short for remote shell. Allows the execution of non-interactive programs on another system. Pronounced as letters or “R-shell.”
Related:
runas
A command to execute a program by “running as” another user.
Ex: The common language runtime. The runtime of Blade Runner. A run-time function or analytic. Run-time errors.
A programming language.
A ransomware attack.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.