Exploiting human psychology rather than technical vulnerabilities. Phishing is a prime example.
Accessing a computer over a network. Can be handy but also opens security holes if not set up right.
Audio from multiple speakers positioned around you. 5.1, 7.1, Dolby Atmos are popular setups.
Adding random data to a hash to make it harder to crack. A pinch of salt keeps your hash secure!
A profile for logging into a system. Can be an administrator (full control) or standard user (limited).
A self-replicating virus that spreads over networks without needing to piggyback on another program.
A normal account for day-to-day use. Can’t accidentally (or purposely!) mess up the system.
