An application that allows remote access to a computer while bypassing normal authentication and remaining hidden within the system.
bandwidth attacks
An attempt to overload a network infrastructure by generating large amounts of traffic.
black-box (testing)
A method of testing software whereby the internal workings of the item being tested are unknown by the tester.
black-hat hacker
A skilled hacker who uses his expertise for illegal purposes.
blind-spoofing
A method of session hijacking in which the hijacker is unable to see the traffic being sent between the host and the target.
Bluetooth
A means of connecting and exchanging information among devices such as PDAs, laptops, and mobile telephones via globally available shortwave radio frequency.
brute force attack
Attempt to determine a password or key by exhaustively working through every possibility.
buffer overflow attack
An exploitation of the buffer overflow condition that occurs when a program attempts to write data to a memory buffer that is larger than it can hold.
bytecode
Programming code that is run through a virtual machine instead of the computer processor after it is compiled.