Changes

Jump to navigation Jump to search
358 bytes added ,  17:52, 8 April 2009
no edit summary
Line 34: Line 34:     
A clever circumvention of security allowing a user to perform tasks that are not normally permitted. Often several exploits will be employed in a series with the user gaining increased authority over a system at each step, the goal typically being complete access and control.
 
A clever circumvention of security allowing a user to perform tasks that are not normally permitted. Often several exploits will be employed in a series with the user gaining increased authority over a system at each step, the goal typically being complete access and control.
 +
 +
== H ==
 +
 +
=== Hexadecimal (Hex) ===
 +
 +
A term used to describe the base 16 number system, in which each digit represents four bits. After the digits 0-9, the letters A-F are used to represent the values 10-15. Hexadecimal is the preferred format for displaying binary data, as it is easy to mentally convert to/from binary and uses only 2 characters per byte.
    
== S ==
 
== S ==
404

edits

Navigation menu