• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

A to Z of Cyber Crime

Status
Not open for further replies.

F.I.G.H.T.E.R

ϻɵĐęřåŦō&#1136
User
Joined
Mar 26, 2013
Messages
975
Reputation
0
Reaction score
15,790
Points
493
Credits
0
‎12 Years of Service‎
20%
A to Z of Cyber Crime

This link is hidden for visitors. Please Log in or register now.


Code:
>1. Anonymizer ...............................................................................................10
2. ARP cache poisoning .............................................................................13
3. Backdoor ....................................................................................................15
4. Backscatter ................................................................................................16
5. The Blues- Bluebugging Bluejacking and Bluesnarfing .........17
6. Buffer overflow ........................................................................................20
7. Bullying in Cyberspace .........................................................................22
8. Click fraud ..................................................................................................25
9. Computer trespass .................................................................................27
10. Cookie Manipulation ...........................................................................29
11. Copyright infringement .....................................................................34
12. Crap-flooding .........................................................................................36
13. Cyber Stalking .......................................................................................37
14. Cyber Terrorism ...................................................................................42
15. Cyber Warfare .......................................................................................48
16. Data Diddling .........................................................................................50
17. Data Leakage ..........................................................................................53
18. Defamation .............................................................................................54
19. DOS / DDOS ............................................................................................57
20. DNS poisoning .......................................................................................59
21. Easter Eggs .............................................................................................61
22. Email Spoofing ......................................................................................64
23. Encryption use by terrorists ...........................................................67
24. eShoplifting ............................................................................................74
25. Financial Crimes ...................................................................................76
26. Fire Sale....................................................................................................79
27. Fire Walking ...........................................................................................81
28. Footprinting ...........................................................................................82
29. Fraud .........................................................................................................88
30. Online Gambling ...................................................................................93
31. Google based hacking .........................................................................94
32. Griefers .................................................................................................. 102
33. Hactivism .............................................................................................. 104
34. Hijacking ............................................................................................... 106
35. Identity Fraud ..................................................................................... 109
36. Impersonation .................................................................................... 111
37. Joe - Job ................................................................................................. 113
38. Key stroke Logging ........................................................................... 115
39. Logic Bomb .......................................................................................... 117
40. Lottery Scam ....................................................................................... 119
41. Mail Bombing ..................................................................................... 121
42. Malware ................................................................................................ 123
43. Nigerian 419 Fraud Scheme ......................................................... 125
44. Packet Sniffing .................................................................................... 128
45. Phishing & Spoofing attacks ......................................................... 129
46. Piggy backing ...................................................................................... 133
47. Piracy of Software ............................................................................. 135
48. Pod Slurping ........................................................................................ 138
49. Poisoning the Source ....................................................................... 140
50. Pornography ....................................................................................... 144
51. robots.txt file ....................................................................................... 146
52. Port scanning ...................................................................................... 148
53. Rootkits ................................................................................................. 151
54. Salami Theft ........................................................................................ 152
55. Sale of Illegal Articles ...................................................................... 155
56. Scavenging ........................................................................................... 157
57. Smishing ............................................................................................... 158
58. Social Engineering ............................................................................ 159
59. Spambot ................................................................................................ 161
60. SQL Injection ....................................................................................... 164
61. Stealware .............................................................................................. 166
62. Time Bomb .......................................................................................... 167
63. Trojan ..................................................................................................... 169
64. URL Manipulation ............................................................................. 181
65. Virus Attack ......................................................................................... 183
66. Web defacement ................................................................................ 186
67. Vishing ................................................................................................... 189
68. Wire - Tapping ................................................................................... 1909 | Page
69. Worm ..................................................................................................... 19
70. XSS Attack ............................................................................................ 195
71. Zero Day Attack ................................................................................. 197
72. Zeus ......................................................................................................... 199
73. Zombie ................................................................................................... 201


[HIDE-THANKS]
This link is hidden for visitors. Please Log in or register now.
[/HIDE-THANKS]
 
Re: A to Z of Cyber Crime

educative...for noobs...elite..etc

 
Status
Not open for further replies.
Back
Top