H
 
Host-Based Firewall
What it is A host-based firewall runs on a single device and filters that device’s network traffic - blocking suspicious inbound connections and limiting what apps can send out. It’s your last line of defense if something slips past the network edge. ...
 
Host-Based ID
What it is Host-based intrusion detection (often written HIDS) watches a single computer for suspicious activity. It reads system logs, processes, files, and registry changes on that host, then alerts you if behavior breaks policy or matches known ...
 
Honeypot
What it is A honeypot is a decoy system set up to attract and watch attackers. It looks real - a login page, database, or server - but its job is to record tactics and block follow-up moves without risking your production network. Learn more in our ...
 
Hoax
What it is A hoax is a fake claim dressed up as truth - a rumor, warning, “breaking news,” or miracle fix designed to make you believe, share, or install something you shouldn’t. Online, hoaxes often push you to download malware, hand over data, or ...
 
Heuristic Analysis
What it is Heuristic analysis is how security tools spot new or tweaked malware by watching what a file or process does, not just what it’s named. Instead of matching a known signature, it flags suspicious behavior like hidden installs, privilege ...
 
Hawkeye
What it is Hawkeye is a Windows remote access trojan and keylogger that steals sensitive data like passwords, cookies, and credit card details, then sends it back to attackers. It can also install extra payloads and keep a quiet foothold on the ...
 
Hacking
What it is (in plain words): Hacking is finding a way into a system that wasn’t meant to be used as a door. Sometimes it’s done to fix problems (ethical hacking); other times it’s to steal data, spy, or cause damage (malicious hacking). Common ways ...