Skip to main content
Completion requirements

Definitions and Descriptions.


Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page: (Previous)   1  2
  ALL

D

Dossier

A suspect dossier is a file or collection of information that is compiled in order to identify and potentially prosecute an individual or group for a suspected crime. It may include details about the suspect's personal information, past criminal history, associates, and any evidence that has been gathered in the investigation.

For example, a suspect dossier might be created in a murder investigation, with information about the victim and the possible motive for the crime, as well as any forensic evidence that has been collected. It could also be used in a fraud case, with details about the suspect's financial transactions and any documents or evidence of wrongdoing.

A suspect dossier may be created by law enforcement agencies, private investigators, or other organizations involved in the investigation. It is used as a reference tool to help identify and track the suspect and to build a case against them. It may be shared with other investigators or legal authorities in order to coordinate the investigation and prosecution.


Doxxing

Doxxing refers to the practice of intentionally releasing personal information about an individual online, often with the intent to harass or intimidate them. This information can include things like a person's full name, address, phone number, email address, social media profiles, and any other personal details that can be found online.

Doxxing is often motivated by a desire to seek revenge or to punish someone for something they have done or said. It can also be used as a tool for online harassment or cyberbullying.

Here are some examples of doxxing:

  1. A person who disagrees with another person's political views may doxx them by posting their personal information online and encouraging others to harass them.

  2. A group of individuals may doxx someone they perceive as being a "troll" or someone who engages in online behavior they find unacceptable.

  3. Someone may doxx someone they are in a personal or professional dispute with in order to try and damage their reputation.

  4. An individual may doxx someone they feel has wronged them in some way, as a form of revenge or punishment.

Doxxing can have serious consequences for the victim, including online harassment, stalking, and even physical harm. It is important to remember that it is never okay to intentionally release someone else's personal information online without their consent.



Dump1090

Dump1090 is a command-line utility that allows users to decode and display data from an aviation radar system called Mode S. Mode S is a type of radar system used by aviation authorities to track aircraft in real-time, and dump1090 can be used to display this data in a more user-friendly format.

To use dump1090, you will need to install it on your computer and then run the command-line utility with the appropriate flags and parameters. For example, you might run a command like "dump1090 -q" to display the aircraft data in a quiet mode, without any additional output.

There are many different ways to use dump1090, depending on your specific needs and goals. Some common uses for dump1090 include:

  1. Displaying real-time aircraft data: You can use dump1090 to view the location, altitude, and other details of aircraft in your area in real-time. This can be useful for aviation enthusiasts, pilots, or anyone else interested in tracking aircraft movements.

  2. Generating reports: You can use dump1090 to generate reports on aircraft activity over a certain period of time, such as a day, week, or month. This can be useful for aviation authorities or other organizations that need to track aircraft movements for regulatory or other purposes.

  3. Debugging aviation systems: If you work in the aviation industry, you may use dump1090 to help debug and troubleshoot issues with Mode S radar systems or other aviation technologies.

Overall, dump1090 is a powerful tool for decoding and displaying aviation radar data, and it can be used for a wide variety of purposes, from tracking aircraft movements to debugging aviation systems.



Dynamic Malware Analysis

Dynamic malware analysis is a technique used to analyze and understand the behavior of a malware sample by running it in a controlled environment and observing its actions. This technique is used to identify the malicious capabilities of a malware sample and to determine the best course of action to mitigate or remove the threat.

There are several ways to perform dynamic malware analysis, including:

  1. Sandboxing: This involves running the malware sample in a virtualized or isolated environment to prevent it from accessing or affecting the host system. The sandboxed environment allows the analyst to observe the malware's behavior and record its actions, such as file system or network activity.

  2. Debugging: This involves using a debugger tool to step through the malware's code and analyze its behavior. This can be useful for understanding how the malware functions and identifying any vulnerabilities or weaknesses in its code.

  3. Memory analysis: This involves analyzing the memory of the host system while the malware is running to identify any changes or modifications made by the malware. This can help the analyst understand the malware's behavior and identify any hidden or malicious functions.

Examples of dynamic malware analysis include:

  1. Running a malware sample in a sandboxed environment and observing its behavior, such as creating new files or accessing network resources.

  2. Using a debugger tool to step through the malware's code and analyze its behavior, such as identifying malicious functions or vulnerabilities.

  3. Analyzing the memory of the host system while the malware is running to identify any changes or modifications made by the malware, such as injecting malicious code into legitimate processes.




Page: (Previous)   1  2
  ALL


loader image