1). Back door - In the security of a system, a hole deliberately left in place by designers or maintainers. It may be intended for use by service technicians. Rest you know, how dangerous could this be.
2). Daisy Chaining - This is what every good hacker does to avoid getting caught. Basically, you gain entry to a computer or network and use it to gain access to another, then to another. Hackers who get away with database theft usually do this then backtrack (this means they go backward after doing what they intended nd cover their tracks by destroying logs etc).
3). Script-kiddie - This term denotes those who do not know how to hack systems but use malicious code written by others to do their damage.
4). KISS Principle - "Keep It Short and Simple." Principle.
5). Phreaking:-
1. The art and science of cracking the phone network (so as, for example, to make free long-distance calls).
2. By extension, security-cracking in any other context (especially, but not exclusively, on communications networks).
1. Used by gurus to brush off questions they consider trivial or annoying.
2. Used when reporting a problem to indicate that you aren't just asking out of randomness.
8). Vaporware - Not much to Hacking it means Products announced far in advance of any release.
9). Vulcan Nerve Pinch or Three-Finger Salute - The keyboard combination that forces a soft-boot or jump to ROM monitor (on machines that support such a feature). On many micros this is Ctrl-Alt-Del.
10). Wizard - A person who knows how a complex piece of software or hardware works; esp. someone who can find and fix bugs quickly in an emergency. Someone is a hacker if he or she has general hacking ability, but is a wizard only if he or she has detailed knowledge.
11). Banner Grabbing - The practice of obtaining the logon banners from target systems in order to find out what operating systems, versions, and patch levels they are running. This allows an attacker to focus his attack.
12). Brute Force - A method that relies on sheer computing power to try all possibilities until the solution to a problem is found. Usually refers to cracking passwords by trying every possible combination of a particular key space.
13). Buffer Overflow - What happens when you try to stuff more data into a buffer (holding area) than it can handle. This problem is commonly exploited by crackers to get arbitrary commands executed by a program running with root permissions.
14). Chipping - Configuring processors or other computer chips so that they contain some unexpected functions. For example, they could be built so that they fail after a certain time, blow up after they receive a signal on a specific frequency, or send radio signals that allow identification of their exact location.
15). DoS Attack - An abbreviation for “Denial of Service”, DoS refers to an attempt to shut down access to a particular system or network. The target is usually a high-profile web site or e-commerce site.
16). DDoS - An abbreviation for “Distributed Denial of Service”, DDoS refers to a coordinated DoS attack where a number of hosts are directed to attack a single target at the same time. The success of the attack is based on the large number of attacking hosts.
17). Logic Bomb - A bomb is a type of Trojan horse, used to release a virus, a worm or some other system attack. It's either an independent program or a piece of code that's been planted by a system developer or programmer.
18). Orange Book - Officially called the “Trusted Computer System Evaluation Criteria” (TCSEC) from the DoD. It presents the security requirements that a host must meet in order to be considered by the DoD a “trusted system.” There are various levels, ranging from “A” to “D”
19). C2 Security Level - Refers to a security rating of the Orange Book. Class C2 is titled “Controlled Access Protection,” and it refers to systems that make users individually accountable for their actions through login procedures, auditing of security-relevant events, and resource isolation.
20). Red Book - Officially called the “Trusted Network Interpretation” (TNI) from the DoD. With the TNI, the security requirements and rating structure of the TCSEC are extended to networks of computers, ranging from local area networks to wide area networks.
21). Port Redirection - The process of redirecting network traffic from one IP address / port to another IP address / port. This is normal for firewalls and proxy servers, but hackers will sometimes do this in order to circumvent firewalls or secure ports.
22). Session Hijacking - A process where an attacker takes over, or “hijacks”, an existing connection between a client and server. This allows that attacker to execute commands on the server as if he were the real client. Easily performed on Telnet sessions.
23). Spoofing - The process of impersonating another host on a network, including the Internet, by using that hosts IP or MAC address. This can enable the spoofer to mask an attack, or it can enable him to access another host with little or no authentication by pretending to be a “trusted” host.
24). Worm - A worm is an independent program. It reproduces by copying itself in full-blown fashion from one computer to another, usually over a network. Unlike a virus, it usually doesn't modify other programs.
25). Virus - A code fragment that copies itself into a larger program, modifying that program. A virus executes only when its host program begins to run. The virus then replicates itself, infecting other programs as it reproduces.
I have missed some good word, which I don’t remember now, reply the word here, I will add it too... Have Fun