Program čija je svrha raditi nešto u pozadini, bio korisnik prijavljen na računalo ili ne. Glavna svrha servisa nije interakcija s korisnikom nego obavljanje nekog zadatka: posluživanje datoteka, HTML datoteka preko http/https protokola - web server itd.
A computer program that runs in the background, rather than under the direct control of a user; they are usually initiated as background processes. Typically daemons have names that end with the letter "d": for example, syslogd, the daemon that handles the system log, or sshd, which handles incoming SSH connections.
http://searchsoa.techtarget.com/definition/daemon
http://www.webopedia.com/TERM/D/daemon.html

Datotečni sustav čine metode pohrane i organiziranja informacija u računalu na medij sa pohranu podataka.
A file system (or filesystem) is a means to organize data expected to be retained after a program terminates by providing procedures to store, retrieve and update data, as well as manage the available space on the device which contain it.
http://searchstorage.techtarget.com/definition/file-system

Debian je besplatni operacijski sustav objavljen pod GPL licencom. Danas Debian, osim Linux jezgre, podržava i druge jezgre, poput jezgre BSD operacijskog sustava. Inačica Debian 4.0 nazvana Etch, objavljena je 8. travnja 2007. godine.
Debian is a free operating system released under the GPL license. Today Debian supports many kernels, apart from Linux kernel it supports FreeBSD kernel. Version 4.0 named Etch was released April 8, 2007.
http://en.wikipedia.org/wiki/Debian
http://www.debian.org/

Program za pronalaženje pogrešaka koji se koristi prilikom ispitivanja drugih programa.
A debugger or debugging tool is a computer program that is used to test and debug other programs (the "target" program). It is the primary tool used when debugging programs.
http://www.iwebtool.com/what_is_debugger.html
http://www.webopedia.com/TERM/D/debugger.html

Vrlo popularan kriptografski standard, danas zamjenjen standardom AES. Tajni ključ za šifriranje podataka sastoji se od 56 bita, što znaći da postoji ukupno 2^56 (više od 72,000,000,000,000,000) mogućih kombinacija. Za šifriranje poruke se koristi jedan od ključeva iz velikog broja kandidata. Algoritam je simetričan, što znaći da obadvije strane moraju imati tajni ključ kako bi mogli komunicirati.
A widely-used method of data encryption using a private (secret) key. There are 72,000,000,000,000,000 (72 quadrillion) or more possible encryption keys that can be used. For each given message, the key is chosen at random from among this enormous number of keys. Like other private key cryptographic methods, both the sender and the receiver must know and use the same private key.
http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf
http://en.wikipedia.org/wiki/Data_Encryption_Standard

U kriptografiji označava proces obrade podataka iz nečitljivog oblika (šifrat) u oblik koji je čitljiv korisniku. Obično se koristi neki oblik tajnog ključa za dešifriranje podataka.
In cryptography, decryption is the process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password.
http://www.webopedia.com/TERM/D/decryption.html

U kriptografiji napad rječnikom predstavlja metodu pogađanja lozinke (ili tajnog ključa) isprobavanjem svih mogućih riječi iz određenog popisa koji se zove rječnik. Za razliku od napada grubom silom gdje se isprobavaju sve moguće kombinacije znakova, kod napada rječnikom isprobavaju se samo one kombinacije koje su statistički vjerojatnije.
A dictionary attack uses a targeted technique of successively trying all the words in an exhaustive list called a dictionary (from a pre-arranged list of values). In contrast with a brute force attack, where a large proportion key space is searched systematically, a dictionary attack tries only those possibilities which are most likely to succeed, typically derived from a list of words for example a dictionary.
http://www.webopedia.com/TERM/D/dictionary_attack.html
http://www.tech-faq.com/dictionary-attack.html
http://www.pinkas.net/PAPERS/pwdweb.pdf

Program koji prevodi strojni kod u asemblerski jezik. Kao ulaz prima izvršnu datoteku, odnosno, strojni kod programa a kao izlaz daje izvorni asemblerski kod u obliku koji je pogodan za čovjeka. Iz tog razloga se često koristi prilikom reverznog inženjeringa.
A disassembler is a computer program that translates machine language into assembly language—the inverse operation to that of an assembler. Disassembly, the output of a disassembler, is often formatted for human-readability rather than suitability for input to an assembler, making it principally a reverse-engineering tool.
http://whatis.techtarget.com/definition/0 sid9_gci804296 00.html

Domain Name System (DNS) je hijerarhijski sustav imenovanja izgrađen na distribuiranim bazama podataka za računala, usluge ili bilo koji resurs spojen na Internet ili privatnu mrežu.
The Domain Name System (DNS) is a hierarchical naming system built on a distributed database for computers, services or any resource connected to the Internet or a private network.
http://www.kb.iu.edu/data/adns.html
http://www.webopedia.com/TERM/D/DNS.html
http://searchnetworking.techtarget.com/definition/domain-name-system

Kod napada lažiranjem DNS priručne memorije, napadač šalje posebno oblikovani DNS odgovor DNS poslužitelju s namjerom da lažna informacija u DNS odgovoru bude pohranjena u priručnu memoriju DNS poslužitelja. Ovisno o informaciji u lažnom DNS odgovoru, moguć je DoS (eng. Denial of Service) ili MITM (eng. man-in-the-middle) napad.
With DNS cache poisoning an attacker attempts to insert a fake address record for an Internet domain into the DNS. If the server accepts the fake record, the cache is poisoned. Attack can result with obtaining sensitive data, DoS attack or MITM (man-in-the-middle) attack.
http://www.networkworld.com/news/tech/2008/102008-tech-update.html
http://www.freeonlineresearchpapers.com/dns-poisoning
http://froyn.name/poison.html

DNSSEC je skup proširenja DNS-a koji povećavaju sigurnost DNS-a. To se postiže digitalnim potpisivanjem svih DNS odgovora korištenjem strukture javnog ključa (PKI). Time se omogućuje provjera autentičnosti pošiljatelja DNS odgovora koja ne postoji u DNS-u.
The Domain Name System Security Extensions (DNSSEC) is a suite of specifications for securing DNS. All answers in DNSSEC are digitally signed using public key infrastructure (PKI).
http://www.enterprisenetworkingplanet.com/netsecur/article.php/3494711/DNSSEC-What-Is-It-Good-For.htm
http://www.neustarregistry.biz/?q=services/what-dnssec
http://www.icann.org/en/announcements/dnssec-qaa-09oct08-en.htm

Dokan biblioteka omogućuje izradu vlastitih datotečnih sustava te interakciju s istim. Slična je FUSE datoteci koja se koristi za operacijskim sustavima Unix/Linux.
The Dokan library makes it possible to implement a filesystem in a userspace. Dokan Library is similar to FUSE(Linux user mode file system) but works on Windows.
http://dokan-dev.net/en/about/

Platformski i jezično neovisna metoda pristupa objektima u jezicima HTML, XHTML i XML. Objekti DOM modela (kao što su HTML elementi) mogu se adresirati i manipulirati neovisno o jeziku koji se koristi.
The Document Object Model is a cross-platform and language-independent convention for representing and interacting with objects in HTML, XHTML and XML documents. Aspects of the DOM (such as its "Elements") may be addressed and manipulated within the syntax of the programming language in use.
http://www.w3.org/DOM/
http://searchwindevelopment.techtarget.com/definition/Document-Object-Model

Napad na sigurnost na način da se određeni resurs opterećuje onemogućujući mu normalan rad.
A denial of service (DoS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. In a distributed denial-of-service, large numbers of compromised systems (sometimes called a botnet) attack a single target.
http://searchsoftwarequality.techtarget.com/definition/denial-of-service
http://www.webopedia.com/TERM/D/DoS_attack.html
http://en.wikipedia.org/wiki/Denial-of-service_attack

Predstavlja širok skup pravila, tehnologija i alata kojima je cilj osigurati pravilnu uporabu digitalnog sadržaja. Osnovna izvedba svih DRM tehnologija se zasniva na nekom obliku šifriranja sadržaja. Ukoliko se sadržaj ne šifrira nije moguće ograničiti pristup tom sadržaju. Iz tog razloga većina DRM tehnologija šifrira autorski sadržaj pokušavajući što bolje sakriti tajni ključ za dešifriranje i ograničiti tok podataka nakon dešifriranja.
Digital rights management (DRM) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals to limit the use of digital content and devices. The term is used to describe any technology that inhibits uses of digital content that is not desired or intended by the content provider.
http://www.wisegeek.com/what-is-drm.htm
http://computer.howstuffworks.com/drm1.htm
http://windows.microsoft.com/hr-HR/windows-vista/Windows-Media-Player-DRM-frequently-asked-questions

Društveni inženjering je oblik zavaravanja ljudi (a ne računala) kako bi obavili određene radnje ili izdali povjerljive informacije. Glavni cilj društvenog inženjeringa je prikupljanje informacija pomoću kojih će napadač lakše napasti informacijskih sustav ili ostvariti neovlašten pristup.
Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim.
http://searchsecurity.techtarget.com/definition/social-engineering
http://www.social-engineer.org/
http://www.webopedia.com/TERM/S/social_engineering.html

DSA je propisani algoritam standardu digitalnog potpisivanja, a propisanom od strane američke vlade. Razvijen je u NIST-u 1991. godine, nakon čega je uslijedilo nekoliko revizija.
An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers. The signature is computed using rules and parameters such that the identity of the signer and the integrity of the signed data can be verified.
http://www.vocal.com/cryptography/dsa.html
http://en.wikipedia.org/wiki/Digital_Signature_Algorithm

DSSS je tehnika proširenog spektra koja omogućuje bolju kvalitetu prijenosa bežičnih signala ukoliko su prisutne velike smetnje. DSSS se koristi u WLAN (Wi-Fi) mrežama.
DSSS is a spread spectrum technique that allows better transmission quality of wireless signals when there is a great presence of noise. DSSS is used in WLAN (Wi-Fi) networks.
http://www.arcelect.com/dsss_fhss-spead_spectrum.htm
http://searchnetworking.techtarget.com/definition/direct-sequence-spread-spectrum

DTD (eng. Document Type Definition) je skup deklaracija označavanja koje određuju vrstu dokumenta za SGML-skup označnih jezika (SGML, XML, HTML). DTD su prethodnica XML shema i imaju sličnu funkciju, a različite mogućnosti.
DTD (Document Type Definition) is a set of markup declarations that define a document type for SGML-family markup languages (SGML, XML, HTML). DTDs were a precursor to XML schema and have a similar function, although different capabilities.
http://searchsoa.techtarget.com/definition/Document-Type-Definition
http://www.w3schools.com/dtd/default.asp
http://webdesign.about.com/od/dtds/a/aa101700a.htm
