WHAT IS.....?
🔰Proxy Trojan🔰
A proxy Trojan is a virus which hijacks and turns the host computer into a proxy server,part of a botnet,from which an attacker can stage anonymous activities and attacks.
Thewhole point of a proxy Trojan is to hide the attacker,making it harder to trace the true origin of an attack since the attacks will look like they are coming from random and multiple directions because of the proxy bots.
➖ ➖
Ⓜ️COMPUTER WORMⓂ️
🌀Like a virus, a worm is also a self-replicating program. It differs from a virus in that (a.) it propagates through computer networks without user intervention; and (b.) does not need to attach itself to an existing program. Nonetheless, many people use the terms "virus" and "worm" interchangeably to describe any self-propagating program.🌀
➖➖
🔰Social media optimization (SMO) 🔰
Ⓜ️Social media optimization (SMO)is the process of increasing the awareness of a product,brand or event by using a number of social media outlets and communities to generate viral publicity.
Social media optimization includes using RSS feeds,social news and bookmarking sites,as well as social media sites and video and blogging sites.SMO is similar to SEO(search engine optimization)in that the goal is to drive traffic to your Web site.
➖ ➖
Ⓜ️OpenVASⓂ️
🌀OpenVAS (also known as the old classic “Nessus”) is an open-source network scanner used to detect remote vulnerabilities in any hosts. One of the best-known network vulnerability scanners, it’s very popular among system administrators and DevOps and infosec professionals.🌀
➖➖
Ⓜ️WAPITIⓂ️
🌀Wapiti is a free open-source command-line based vulnerability scanner written in Python. While it’s not the most popular tool in this field, it does a good job of finding security flaws in many web applications.🌀
➖➖
Ⓜ️LC4Ⓜ️
🌀LC4 was formerly known as L0phtCrack. It is a password auditing and recovery application. It is used to test password strength and sometimes to recover lost Microsoft Windows passwords, by using dictionary, brute-force, and hybrid attacks.LC4 recovers Windows user account passwords to streamline migration of users to another authentication system or to access accounts whose passwords are lost.🌀
➖
A proxy Trojan is a virus which hijacks and turns the host computer into a proxy server,part of a botnet,from which an attacker can stage anonymous activities and attacks.
Thewhole point of a proxy Trojan is to hide the attacker,making it harder to trace the true origin of an attack since the attacks will look like they are coming from random and multiple directions because of the proxy bots.
➖ ➖
Ⓜ️COMPUTER WORMⓂ️
🌀Like a virus, a worm is also a self-replicating program. It differs from a virus in that (a.) it propagates through computer networks without user intervention; and (b.) does not need to attach itself to an existing program. Nonetheless, many people use the terms "virus" and "worm" interchangeably to describe any self-propagating program.🌀
➖➖
🔰Social media optimization (SMO) 🔰
Ⓜ️Social media optimization (SMO)is the process of increasing the awareness of a product,brand or event by using a number of social media outlets and communities to generate viral publicity.
Social media optimization includes using RSS feeds,social news and bookmarking sites,as well as social media sites and video and blogging sites.SMO is similar to SEO(search engine optimization)in that the goal is to drive traffic to your Web site.
➖ ➖
Ⓜ️OpenVASⓂ️
🌀OpenVAS (also known as the old classic “Nessus”) is an open-source network scanner used to detect remote vulnerabilities in any hosts. One of the best-known network vulnerability scanners, it’s very popular among system administrators and DevOps and infosec professionals.🌀
➖➖
Ⓜ️WAPITIⓂ️
🌀Wapiti is a free open-source command-line based vulnerability scanner written in Python. While it’s not the most popular tool in this field, it does a good job of finding security flaws in many web applications.🌀
➖➖
Ⓜ️LC4Ⓜ️
🌀LC4 was formerly known as L0phtCrack. It is a password auditing and recovery application. It is used to test password strength and sometimes to recover lost Microsoft Windows passwords, by using dictionary, brute-force, and hybrid attacks.LC4 recovers Windows user account passwords to streamline migration of users to another authentication system or to access accounts whose passwords are lost.🌀
➖