Home      Products      Services      About us      Contact      Publicity      Legal      Wallpapers      TV free online      Spanish  

    Free AntiVirus
     Free AntiSpyware
     Free Firewalls
     Free AntiSpam
     Free AntiDialer
     Free AntiPopup
     Free AntiRootkit
     Free Utilities
     Creator of Image

    Antivirus On line
    AntiHackers Online
    AntiSpyware Online
    Test Ports Online
    Test Speed On line
    Show True IP

    Boot Disk
    Disk Manager
    Tools Antivirus

  Concept of Virus
    Concept of Spyware
    Concept of Hackers
    Concept of Dialers
    Concept of Rootkits
    Concept of Spam
    Concept of Exploit
    Concept of Phishing
    Concept of Hoax

    To buy a PC
    To install Windows

    The Prevention
    The Disinfection
    The Recovery
    Useful indication
    Gmail Hard disk

  Critical Patches
    New Alerts
    The new News



(of English to exploit, to explode) it is the name with which a malicious computer science program is identified,  or it leaves from the program, that it tries to force some deficiency or  vulnerability of another program.  

The aim can be the destruction or incapacitation of the attacked system, although normally one is to violate the safety measures in order to be able to accede to the same one of nonauthorized form and  use it in own benefit  or as origin of other attacks to third. 

Xploits can be characterized according to categories of used vulnerabilities: 

Vulnerabilities of buffer underflow 
Vulnerabilities of condition of race 
Vulnerabilities of error of chain format 
Vulnerabilities of Cross Site Scripting XSS
Vulnerabilities of Injection SQL 
Vulnerabilities of Injection of Characters  CRLF
Vulnerabilities of refusal of the service 
Vulnerabilities of Multiple injection HTML  Multiple HTML Injection
Vulnerabilities of deceptive windows or mistificación of windows  Window Spoofing


Recommend     Favorites     This Page Your Start Page     Legal     Contact     About us

 Webstats4U - Web site estadØsticas gratuito

El contador para sitios web particulares  

SEGURIDADPC.NET© 2005 - 2007