obfuscation techniques

obfuscation techniques
techniki zaciemniania

English-Polish dictionary of Electronics and Computer Science. 2013.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Obfuscation — L obfuscation, assombrissement, ou obscurcissement[1] est une stratégie de protection de la vie privée qui consiste à publier en quantité des informations. De cette manière, on tente de noyer les informations existantes que l on souhaite cacher.… …   Wikipédia en Français

  • Obfuscation — For the term as used in computer science, see Obfuscated code. Obfuscation (or beclouding) is the hiding of intended meaning in communication, making communication confusing, wilfully ambiguous, and harder to interpret.[citation needed] Contents… …   Wikipedia

  • Eschew obfuscation — Eschew obfuscation, also stated as: eschew obfuscation, espouse elucidation , is a common humorous saying of English teachers and professors when lecturing about proper writing techniques.Literally, the meaning is avoid ambiguity, adopt clarity …   Wikipedia

  • Image spam — is a kind of E mail spam where the message text of the spam is presented as a picture in an image file. Since most modern graphical E mail client software will render the image file by default, presenting the message image directly to the user,… …   Wikipedia

  • Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …   Wikipedia

  • Windows Vista — Part of the Microsoft Windows family …   Wikipedia

  • Deep packet inspection — (DPI) (also called complete packet inspection and Information eXtraction IX ) is a form of computer network packet filtering that examines the data part (and possibly also the header) of a packet as it passes an inspection point, searching for… …   Wikipedia

  • Anti-computer forensics — (sometimes counter forensics) is a general term for a set of techniques used as countermeasures to forensic analysis. Contents 1 Definition 1.1 Sub categories 1.2 Purpose and goals 2 …   Wikipedia

  • Code impénétrable — Le code impénétrable d un programme informatique est un code dont la compréhension est très difficile pour un humain tout en restant parfaitement compilable par un ordinateur. Le procédé par lequel du code est rendu impénétrable est appelé… …   Wikipédia en Français

  • Obfuscated code — Obfuscated code is source or machine code that has been made difficult to understand for humans. Programmers may deliberately obfuscate code to conceal its purpose (security through obscurity) or its logic to prevent… …   Wikipedia

  • Copy protection — Copy protection, also known as content protection, copy obstruction, copy prevention and copy restriction, refer to techniques used for preventing the reproduction of software, films, music, and other media, usually for copyright reasons.[1]… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”