Glossary: Difference between revisions
No edit summary |
|||
| Line 34: | Line 34: | ||
A clever circumvention of security allowing a user to perform tasks that are not normally permitted. Often several exploits will be employed in a series with the user gaining increased authority over a system at each step, the goal typically being complete access and control. | A clever circumvention of security allowing a user to perform tasks that are not normally permitted. Often several exploits will be employed in a series with the user gaining increased authority over a system at each step, the goal typically being complete access and control. | ||
== H == | |||
=== Hexadecimal (Hex) === | |||
A term used to describe the base 16 number system, in which each digit represents four bits. After the digits 0-9, the letters A-F are used to represent the values 10-15. Hexadecimal is the preferred format for displaying binary data, as it is easy to mentally convert to/from binary and uses only 2 characters per byte. | |||
== S == | == S == | ||