Glossary
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z 

Zombie
Computers that are 'owned' by hackers, who can use them to attack the machines they are targeting for denial of service. The legitimate users of the zombies may not be aware that their computer has been controlled by the hacker; however, if the computer is used to launch a damaging attack, the legitimate user may be investigated or held legally responsible.



 

Privacy Statement
Copyright 2010, SecurityFocus