J-M

 < Day Day Up > 



Java chat Rooms

Real-time chat via a Java applet that allows visitors to your Web site to engage in live discussion with you or with each other. You can provide it just for fun, or use it to interact with your customers in real-time.

Jumper

A small, plastic-covered metal clip that slips over two pins protruding from a circuit board. When in place, the jumper connects the pins electronically and closes the circuit, turning it “on.”

Kernel

An essential part of the operating system, responsible for resource allocation, low-level hardware interfaces, security, and more.

Key communicator

An individual or group having the economic, social, or political power to persuade the individuals or groups with which he or she interacts to change or reinforce existing opinions, emotions, attitudes, and behaviors.

Keystroke monitoring

A form of user surveillance in which the actual character-by-character traffic (that user’s keystrokes) are monitored, analyzed, and/or logged for future reference. A specialized form of audit trail software, or a specially designed device, that records every key struck by a user and every character of the response that the host computer returns to the user.

Knowledge

The state or mechanism(s) ascribed to a system to explain complex mediation between effective acquisition of data from, and effective action in, an operational environment. This approach to knowledge explicitly ties it to the processes of both education and inaction with respect to the given operational environment, and, hence, links it to one or more specific actors in that given domain. These connections explain the IW literature’s claims that knowledge is active and must be possessed if it is to exist— let alone be useful.

Knowledge-based warfare

Knowledge-based warfare is the ability of one side to obtain essential and key elements of truth while denying these same elements of truth to the other side. The key attributes of knowledge-based warfare are timely, high fidelity, comprehensive, synthesized, and visual data. The end game is a complete pictorial representation of reality that the decision maker can tune to his or her unique needs at any given time. This picture must include both blue and red data, although this ACTD concentrates on the provision of blue data only.

Knowledge dominance

In warfare, an operational advantage (vis a vis an adversary) in exploiting information to guide effective action. This is the goal of information dominance.

Knowledge war

A synonym for IW or third-wave war.

Leapfrog attack

Any form of intrusion or attack accomplished by exploitation of data or information obtained on a site or server other than the attack’s target.

Letter bomb/letterbomb

Malicious or disruptive code delivered via an e-mail message (and/or an attachment to said message). A piece of e-mail containing live data intended to do malicious things to the recipient’s machine or terminal. Under UNIX, a letterbomb can also try to get part of its contents interpreted as a shell command to the mailer. The results of this could range from silly to tragic.

Logic bomb

The term for a mischievous or destructive piece of software (virus, Trojan horse which lies resident on the victim computer or system until triggered by a specific event (onset of a predetermined date or set of system conditions).

Lost cluster chain

This is a cluster on disk that is not registered as free, but does not have any known data in it.

Mail bomb/mailbomb

Unlike logic bomb (a thing), mail bomb is a verb used to connote deliberately deluging a target system or host with e-mail messages for purposes of harassment, degradation of service, or even denial of service.

Mail storm/mailstorm

What the target system or users see when being mail bombed. Any large amount of incoming e-mail sufficient to disrupt or bog down normal local operations. What often happens when a machine with an Internet connection and active users reconnects after extended downtime—a flood of incoming mail that brings the machine to its knees.

Majordomo list

This is a very flexible tool for allowing your clients to interact with each other by e-mail. In simple terms, it is an interactive e-mail discussion group that allows all subscribers to send and receive messages to and from everyone on the list through e-mail, sort of like an e-mail chat room, but not in real time. Majordomo lists usually focus on a particular topic of common interest, such as dried flower arranging, forensics, or anything that people can share information or talk about. There are many configurable features including automatic subscribe and unsubscribe and much more. Each list can e-mail up to 1500 e-mails per day.

MASINT

Acronym for measurement and signature intelligence.

Measurement and signature intelligence

Scientific and technical intelligence obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time dependence, modulation, plasma, and hydromagnetic) derived from specific technical sensors for the purpose of identifying any distinctive features associated with the source, emitter, or sender and to facilitate subsequent identification and/or measurement of the same.

MEII

Acronym for minimum essential information infrastructure.

Message

Any thought or idea expressed briefly in a plain or secret language and prepared in a form suitable for transmission by any means of communication.

MIE

Acronym for military information environment.

Military deception

Actions executed to deliberately mislead adversary military decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission.

Military information environment (MIE)

The environment contained within the global information environment, consisting of information systems and organizations (friendly and adversary, military and nonmilitary) that support, enable, or significantly influence a specific military operation.

Military information function

Any information function supporting and enhancing the employment of military forces.

Military technical revolution (MTR)

A term from Soviet military theorization of the late 1970s. It denotes the phenomenon of extreme transformations in warfare occurring as a result of the exploitation of technology. The Soviets saw the operational and organizational innovations resulting from the exploitation of the technology as defining a military technical revolution.

Minimum essential information infrastructure (MEII)

A label for the least set of own-force information assets that can serve to support a given mission or operation.

Mirror image back-ups

Mirror image back-ups (also referred to as bit stream back-ups) involve the back-up of all areas of a computer hard disk drive or another type of storage media (Zip disks, floppy disks, Jazz disks, etc.). Such mirror image back-ups exactly replicate all sectors on a given storage device. Thus, all files and ambient data storage areas are copied. Such back-ups are sometimes referred to as “evidence grade back-ups” and they differ substantially from standard file back-ups and network server back-ups.

Misuse detection

The class of intrusion-detection tactics that proceed on the presumption that problematical intrusions (attacks) can be positively characterized, and that detection of their characteristic profile is sufficient for identifying potential threats.

Mockingbird

A computer program or process that mimics the legitimate behavior of a normal system feature (or other apparently useful function) but performs malicious activities once invoked by the user.

Monthly traffic (bandwidth)

Your monthly traffic is the sum of outward-bound or inward-bound Web pages, files, e-mail, and anonymous FTP traffic. Each time a Web page, image, audio, video, and other elements of your Web site is accessed by your visitor, traffic is generated.

Motherboard

The “heart” of your PC—it handles system resources (IRQ lines, DMA channels, I/O locations), as well as core components such as the CPU, and all system memory. It accepts expansion devices such as sound and network cards, and modems.

mSQL database

A database engine used for accessing individual records.

MTR

Acronym for military technical revolution.



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net