A person who enjoys exploring the details of computers and how to stretch their capabilities. A malicious or inquisitive meddler who tries to discover information by poking around. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn on the minimum necessary.
Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network
A telephone permanently wired via a terminal block, not by a plug and socket arrangement. Do not confuse with Wireline.
Host Controller Interface
Health Insurance Portability and Accountability Act (HIPAA).
Health Level 7 (formatting and protocol standard)
A flat optical image with the effect of three-dimensions to the naked eye.
Information, such as audit data from a single host which may be used to detect intrusions
A single computer or workstation; it can be connected to a network.
Homeland Security Presidential Directive 12
High Transmission Cellular
Hyper Text Transfer Protocol
A smart card that combines two different technologies such as magnetic stripe and chip.