bumping n.— «This security consultant is about to demonstrate how easy it is to pop open a P.O. Box with nothing more than a tapping device and a blank key.…It’s a method called “bumping” and he says anyone can do it. He...
flexicurity n.— «Numerous experts have praised Nordic countries’ systems, particularly that of Denmark, for their ability to create jobs while maintaining a high standard of social security for the unemployed. Industry associations also...
class break n.— «What is a “class break?” In network security jargon, that’s what happens when one breach leads to a whole new “class” of attacks on various systems, using similar methods.» —“Citibank security...
puffer machine n.— «In airports with puffer machines, passengers are asked to step into a portal as they approach security. Once inside, jets of air blow in rapid sequence to dislodge trace particles from the passenger’s clothes and skin...
ineptware n.— «Sophos, another security company, is similarly scathing of Sony and is calling the software “ineptware.”…The DRM software uses what is known as a “rootkit.”» —“Sony’s antipiracy may end up...
oil-spot theory n.— «The actual strategy which the government adopted in its attempts to prevent a communist takeover was only articulated to any appreciable degree in the military domain. It might be summarized as an urban-based strategy...