Some words, terms and phrases you might want to know more about.


Elite, or leet.


Anonymity, adjective "anonymous", is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". An important example for anonymity being not only protected, but enforced by law is probably the vote in free elections. - wikipedia


The blame game, a massive who done, where we try to find the pretetrator of the cyber attack.


In this context breach refers to a security breach. Where an intruder has managed to penetrate your security perimeter. There by gaining access to privileged information.


Orginating from the word cybernetics. It has come to encompass everything relating to the internet and cyberspace.


In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor. - wikipedia




A piece of code to make use of a vulnerability.


Person with emense intellect and skill. Making things work as well as creating new and fantastic projects that change the world.


A hackerspace (also referred to as a hacklab, makerspace or hackspace) is a community-operated workspace where people with common interests, often in computers, machining, technology, science, digital art or electronic art, can meet, socialize and collaborate. - wikipedia


Non-Disclosure Agreement, an agreement reached between parties to not divulge any private information of the other party.


Hiding something.


Operations Security. The act of being proactively paranoid and hiding or minimizing the leakage of vital personal private information. Taking measure to dissemenate false information to mislead your adversary and gain the upper hand.


PenTest also known as a penetration test.


Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. - wikipedia

Pwn, or pwned

Someone has been able to gain admin or root privileges on a machine and is now considered the new owner. They can do any number of things to the device.


Also known as a script kiddie. Individual lacking in ability who has to rely on others people code and tools.

Threat modeling

Mapping out the threats that are facing you and the liklihood of each. Then setting up appropriate responses.


A users' group (also user's group or user group) is a type of club focused on the use of a particular technology, usually (but not always) computer-related. - wikipedia


A weakness in an application.