JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
M
M
MAC
MAC (Media Access Control)
Macdink
Machinable
Machine Cryptosystem
Machine Instruction
Machine Language
Machine Learning
Machine Word
Machine-Oriented Language
Machine-Readable Medium
Machoflops
Macintoy
Macintrash
Macro
Macrology
Macros
Macrotape
Maggotbox
Magic
Magic Cookie
Magic Number
Magic Smoke
Magnetic Card
Magnetic Core Storage
Magnetic Disk
Magnetic Disk Unit
Magnetic Drum
Magnetic Drum Unit
Magnetic Field
Magnetic Field Intensity
Magnetic Flux
Magnetic Flux Density
Magnetic Media
Magnetic Oxide
Magnetic Remanence
Magnetic Saturation
Magnetic stripe card
Magnetic Tape
Magnetic Tapes
Mail host
Mail server
Mail server antivirus program
Mail Storm
Mailbomb
Mailbox
Mailing List
Main firewall
Main Loop
Mainframe
Maintainability
Maintenance
Maintenance Hook
Maintenance Key
Maintenance Of Configuration Documentation
Maintenance Procedures, Contract Employee
Maintenance Procedures, Local Employee
MAJCOM
MAJCOM C4 Systems Security Office
MAJCOM Computer System Security Manager
MAJCOM Computer System Security Manager (MCSSM)
Major incidents
Major Information System
Malicious Code
Malicious links
Malicious Logic
Malicious payload
Malicious software (Malware)
Malware (malicious software)
MAN
MAN (Metropolitan Area Network)
Managed security service provider (MSSP)
Management
Management Control Process
Management Information System
Management Of The Security Function
Manchester Encoding
Mandatory
Mandatory Access
Mandatory Access Control
Mandatory Access Control (MAC)
Mandatory Access Controls
Mandatory default algorithms
Mandatory Modification
Mandatory Protection
Mandatory vacations
Mandelbug
Manged
Mangle
Mangler
Mango
Man-in-the-middle attack
Manipulation Detection
Manipulative
Manipulative Communications Deception
Manual Cryptosystem
Manual Remote
Manual Remote Rekeying
Manularity
MAPLESS
Marbles
Marginal
Marginal Hacks
Marginally
Mark
Marketroid
Marking
Marking Of Media
Marking Of Sensitive Information
Marking Pulse
Marking Signal
Mars
Martian
M-Ary Code
MASINT
Mask
Masquerade
Masquerading
Massage
Master Crypto-Ignition Key
Master key
Master Station
Match index
Matching Programs
Material
Material Symbol
Math-Out
Matrix
MATSYM
Maximum Access Time
Maximum Maytag Mode
Mbogo, Dr. Fred
MBSA
MCCB
MCCR
MCSSM
MCTL
MD5
MD5 CHAP
MDC
Measure Of Effectiveness
Measurement And Signature Intelligence
Meatware
Media
Media Access Control (MAC)
Media Convergence
Mediation
Medium
Medium Access Control Sublayer
Meeces
MEECN
Meg
Mega
Megapenny
MEGO
Meltdown, Network
Member server
Meme
Meme Plague
Memetics
Memory
Memory (Non-Volatile)
Memory (Random)
Memory (Sequential)
Memory (Volatile)
Memory Address Translation Unit
Memory Bounds
Memory Bounds Checking
Memory Leak
Memory Mapping
Memory Page Cache
Memory Smash
Menu
Menuitis
MEP
MER
Message
Message Alignment Indicator
Message Authentication
Message Authentication Code
Message Authentication Codes
Message Broadcast
Message digest
Message Distribution Center
Message Externals
Message Format
Message Handling Systems
Message Indicator
Message integrity
Message Register Leads
Mess-Dos
Meta Bit
Metadata
Metal Particle Tape
Metamorphic viruses
Metasyntactic Variable
Method
Metric
Metrics
Metropolitan Area Network (MAN)
Metropolitan Area Network MAN
MFTL
Mgt
MHS
MHz
MI
MIB
Mickey
Mickey Mouse Program
Micro
Microcode
Microcomputer
Microengine
Microfloppies
Microfortnight
Microinstruction
MicroLenat
Microprocessor
Microprogram
MicroReid
Microsequencer
Microsoft Baseline Security Analyzer (MBSA)
Microsoft Challenge-Handshake Authentication Protocol (MS-CHAP)
Microsoft Management Console (MMC)
Microsoft Point-to-Point Encryption (MPPE)
Microtape
Microwave mw
Microwave/Wireless Communications Security
Middle-Endian
MIJI
Militarily Critical Technology
MilliLampson
MIL-STD
MIME filtering
Mimicking
Minicomputer
Minifloppies
Minimal Protection
Minimizing security burdens
Minor Change
Minor Change To A System Of Records
Minor incidents
MINTERM
MIPR
MIPS
Misbug
Misfeature
Missed'em-Five
Missile Address
Mission-Critical
Mission-Essential Unclassified Information
Miswart
MLS
MMC (Microsoft Management Console)
MOA
Mobile COMSEC Facility
Mobile content
Mobile Workstation Security
Moby
Mockingbird
Mod
Mode
Mode Bit
Mode Of Operation
Modem
Modes Of Operation
Modification
Modularity
Modulo
MOE
Molly-Guard
Mongolian Hordes Technique
Monitor
Monitor Signal
Monitoring
Monitoring (e. g. , Data, Line)
Monkey Up
Monkey, Scratch
Monochromatic
Monographic Processing
Monolithic TCB
Monstrosity
Monty
Moof
Moore's Law
Moose Cal
MOP
More fragments
Moria
MOU
Mouse
Mouse Ahead
Mouse Around
Mouse Belt
Mouse Droppings
Mouse Elbow
Mouso
MPPE (Microsoft Point-to-Point Encryption)
MRK
MRT
MS-DOS
MSE
MTBF
MTR
MTT
Mu
MUD
Muddie
Mudhead
Multichannel Information
Multician
Multics
Multilevel
Multi-Level
Multilevel Device
Multilevel Mode
Multilevel Mode Or Multilevel Security Mode
Multilevel Processing
Multilevel Secure
Multilevel Security
Multilevel Security Mode
Multilevel Systems
Multiple Access
Multiple Access Rights Terminal
Multiple Call
Multiplexing
Multiprocessing
Multiprocessor
Multiprogramming
Multi-pronged attacks
Multi-Satellite Link
Multitask
Multitasking
Multi-User Hosts
Multiuser Mode Of Operation
Multi-User Mode Of Operation
Multi-User Security Mode
Multi-User Security Mode Of Operation
Mumblage
Munch
Munching
Munching Squares
Munchkin
Mundane
Mung
Munge
Murphy's Law
Music
Mutter
Mutual Suspicion
Mutual Synchronization
Mutually Suspicious
Mutually Synchronized Network
MUX
Mw
MUD
/muhd/ n. [acronym, Multi-User Dungeon; alt. Multi-User Dimension] A class of virtual reality experiments accessible via the Internet. These are real-time chat forums with structure; they have multiple `locations' like an adventure game, and may include combat, traps, puzzles, magic, a simple economic system, and the capability for characters to build more structure onto the database that represents the existing world. 2. vi. To play a MUD. The acronym MUD is often lowercased and/or verbed; thus, one may speak of `going mudding', etc. Historically, MUDs (and their more recent progeny with names of MU- form) derive from a hack by Richard Bartle and Roy Trubshaw on the University of Essex's DEC-10 in the early 1980s; descendants of that game still exist today and are sometimes generically called BartleMUDs. There is a widespread myth (repeated, unfortunately, by earlier versions of this lexicon) that the name MUD was trademarked to the commercial MUD run by Bartle on British Telecom (the motto "You haven't *lived* 'til you've *died* on MUD!"); however, this is false -- Richard Bartle explicitly placed `MUD' in PD in 1985. BT was upset at this, as they had already printed trademark claims on some maps and posters, which were released and created the myth. Students on the European academic networks quickly improved on the MUD concept, spawning several new MUDs (VAXMUD, AberMUD, LPMUD). Many of these had associated bulletin-board systems for social interaction. Because these had an image as `research' they often survived administrative hostility to BBSs in general. This, together with the fact that Usenet feeds have been spotty and difficult to get in the U. K. , made the MUDs major foci of hackish social interaction there. AberMUD and other variants crossed the Atlantic around 1988 and quickly gained popularity in the U. S. ; they became nuclei for large hacker communities with only loose ties to traditional hackerdom (some observers see parallels with the growth o