A vulnerability that’s exploited before the software maker knows about it and can fix it.
Features that restrict content and computer use. Handy for protecting kids online.
High Dynamic Range. Heightens a picture’s dynamic range (contrast) for richer, more detailed images.
Exploiting human psychology rather than technical vulnerabilities. Phishing is a prime example.
Accessing a computer over a network. Can be handy but also opens security holes if not set up right.
Audio from multiple speakers positioned around you. 5.1, 7.1, Dolby Atmos are popular setups.
Adding random data to a hash to make it harder to crack. A pinch of salt keeps your hash secure!
Converts signals between analog (like cable or phone lines) and digital (like Ethernet). The bridge between your home network and the internet.
