Glossary 307 Geneva Conventions: international peace treaties conducted in 1949 after World War II that define the humane conduct of war (10) gigabyte (GB): 2^30 bytes (approximately a billion) (2) gigahertz (GHz): a billion cycles per second (2) Google hacking: a high-tech recon tactic that involves advanced uses of Google to search for vulnerabilities and sensitive information about the target (4) Gramm-Leach-Bliley Act (GLBA): a United States data privacy law that protects customer records of financial institutions (5) graphical user interface (GUI): an interface with graphics such buttons, icons, and text fields that allow users to point and click as well as to type (2) gray hat hackers: individuals who blur the lines between legal and illegal hacking and engage in both kinds (3) greatest happiness principle: another name for utilitarianism (10) gross negligence: the willful disregard and failure to comply with best practices (5) group: a collection of users (8) guest OS: a virtual machine OS running on a computer (2) hack: an action that is allowed by the system but that undermines the intent of the system (4) hacker: a person who attempts to gain unauthorized access to a computer system or deny access to authorized users (3) Hackers (1995 film): Prodigy hacker Dade Murphy (Jonny Lee Miller), AKA Crash Override, leads a group of teenage hackers including Kate Libby (Angelina Jolie), AKA Acid Burn, in a battle against law enforcement and other hackers (3) hacking back: the practice of trying to hack somebody who has hacked you (3) hacktivism (hacktivist hacking): hacking motivated by a political or ideological cause (3) Hague Conventions: international peace treaties conducted in The Hague, Netherlands, in 1899 and 1907 that define the humane conduct of war (10) Hamming distance: the difference between two equal length bit strings (7) handle: another name for nick (3) hard disk drive (HDD): storage that uses spinning metal platters (2) hardened: made secure (9) hardware: the physical computational components of a computer (2) hash: a short, fixed-length binary string that uniquely represents a data object (7) hash chain: a chain of hash values created by hashing a string, then hashing the hash of the string, and so on (7)
RkJQdWJsaXNoZXIy MTM4ODY=