Phrases.com »

Phrases related to: exploit (computer security)

Yee yee! We've found 59 phrases and idioms matching exploit (computer security).

Sort:RelevancyA - Z
computer says noA popular phrase for an attitude in customer service in which the default response is to check with information stored or generated electronically and then make decisions based on that, apparently without using common sense, and showing a level of unhelpfulness whereby more could be done to reach a mutually satisfactory outcome, but is not.Rate it:

(0.00 / 0 votes)
Security BlanketAn insecure person holding something for emotional and psychological support and comfortRate it:

(0.00 / 0 votes)
boot upTo start a computer using its bootstrap procedure.Rate it:

(5.00 / 7 votes)
f** someone overTo exploit somebody in a way which result in an advantage to oneself, at the cost of the other party gaining a considerable disadvantage.Rate it:

(5.00 / 1 vote)
HALa homicidal computer, an artificial intelligence that acts similarly to the HAL 9000 featured in 2001: A Space Odyssey.Rate it:

(5.00 / 1 vote)
in silicoalluding to the mass use of silicon for semiconductor computer chips, is an expression used to mean "performed on computer or via computer simulation."Rate it:

(5.00 / 1 vote)
back upAs a security measure.Rate it:

(4.33 / 3 votes)
mouse potatoA person who spends excessive amounts of time using a computer.Rate it:

(4.33 / 3 votes)
check outTo obtain computer source code from a repository.Rate it:

(4.00 / 2 votes)
log outTo exit an account in a computer system so that it doesn't recognize you until you log in again.Rate it:

(4.00 / 4 votes)
zip upTo convert a computer file into a smaller package.Rate it:

(4.00 / 2 votes)
a man's home is his castle(US) a proverbial expression of personal privacy and securityRate it:

(3.00 / 4 votes)
fall overOf a computer program, to crash.Rate it:

(3.00 / 1 vote)
go along to get alongTo conform in order to have acceptance and security.Rate it:

(3.00 / 2 votes)
garbage in, garbage out(computing, information technology) If input data is not complete, accurate, and timely, then the resulting output is unreliable and of no useful value.1963, Raymond Crowley, "Robot Tax Collector Seeks Indications of 'Fudging'," Times Daily (Alabama, USA), 1 April (retrieved 26 July 2010):Officials explained that the quality of the computer's work depends on the quality of the data fed into it. Neil Hoke, administrative assistant to Stewart, quoted an adage of computer men: "Garbage in, garbage out."2008, Roger K. Lewis, "'In Architectural Design, Brains and Talent Trump the Best Software," Washington Post, 19 July (retrieved 26 July 2010):The old caveat "GIGO"Rate it:

(2.33 / 3 votes)
MINASWANInitialism of Matz is nice and so we are nice : a motto of the Ruby programming language community, in reference to the demeanor of Yukihiro Matsumoto, the Japanese computer scientist who designed the language.Rate it:

(1.00 / 1 vote)
sign inIn order to get into the office after hours, you'll have to sign in at the security desk.Rate it:

(1.00 / 1 vote)
whore outTo prostitute, take advantage of, exploit, show off; to hire out or provide to others like a whore; to pimp, swap one's sex partner.Rate it:

(1.00 / 2 votes)
an englishman's home is his castle(UK) a proverbial expression of personal privacy and securityRate it:

(0.00 / 0 votes)
bridgeA device which connects two or more computer buses, typically in a transparent manner.Rate it:

(0.00 / 0 votes)
check throughTo permit someone to continue onward, e.g. through a security checkpoint, after verifying their identity, tickets, etc.Rate it:

(0.00 / 0 votes)
close outTo terminate a computer program.Rate it:

(0.00 / 0 votes)
come into one's ownTo reach a stage of development or maturity where one has achieved strength and confidence, economic security, or respect and social acceptance.Rate it:

(0.00 / 0 votes)
dial intoTo join a computer network.Rate it:

(0.00 / 0 votes)
dial upto connect a computer to a modemRate it:

(0.00 / 0 votes)
fencepost problemIn computer programming, a problem dealing with how to treat the initial or boundary values of a discrete problem.Rate it:

(0.00 / 0 votes)
fuck someone overto exploit somebody in a way which results in an advantage to oneself, at the cost of the other party gaining a considerable disadvantage.Rate it:

(0.00 / 0 votes)
game overA message usually signaling that the player failed a computer or video game, for example by losing all of their lives, although the phrase sometimes follows the score after successful completion of a game.Rate it:

(0.00 / 0 votes)
Have Your Cake and Eat It TooTo have something both ways, to have something in possession and be able to exploit or use itRate it:

(0.00 / 0 votes)
holeSolitary confinement, a high-security prison cell often used as punishment.Rate it:

(0.00 / 0 votes)
holeA security vulnerability in software which can be taken advantage of by an exploit.Rate it:

(0.00 / 0 votes)
kitchen table softwareEspecially in the early years of personal computers, a set of computer programs developed by an entrepreneurial advanced amateur or self-employed professional computer programmer in his or her own home; software developed by a small business using the services of such programmers.Rate it:

(0.00 / 0 votes)
log inTo gain access to a computer system, usually by providing a previously agreed upon username and password.Rate it:

(0.00 / 0 votes)
mark upTo add coding to text so that it will display properly on a computer.Rate it:

(0.00 / 0 votes)
melt upOf the price of a security, to increase to an unexpected degree.Rate it:

(0.00 / 0 votes)
mind the storeTo remain present in a retail business, in order to maintain the security of the premises and to serve customers.Rate it:

(0.00 / 0 votes)
mouse overTo move a computer mouse pointer over.Rate it:

(0.00 / 0 votes)
national insurancestate social-security schemeRate it:

(0.00 / 0 votes)
PEBCACProblem Exists Between Chair And Computer. Used by technical support helpdesk staff to indicate that the problem with a user’s computer or experience is due to user error.Rate it:

(0.00 / 0 votes)
PICNICAcronym of problem in chair, not in computer; states that the problem was not in the computer but was instead caused by the user operating it.Rate it:

(0.00 / 0 votes)
pimp outTo prostitute, take advantage of, exploit, use, to hire out or provide to others like a whore.Rate it:

(0.00 / 0 votes)
play onTo exploit by exacerbating.Rate it:

(0.00 / 0 votes)
play the gender cardTo assert that sexism is involved in a situation, especially in order to exploit sexist or antisexist attitudes.Rate it:

(0.00 / 0 votes)
prey onTo exploit or victimize.Rate it:

(0.00 / 0 votes)
punch outTo extract data from a computer by the use of a keyboard.Rate it:

(0.00 / 0 votes)
quiche-eaterIn computer programming circles, a person far removed from practice and concerned only with academic matters, unwilling to "get their hands dirty".Rate it:

(0.00 / 0 votes)
real timeThe time duration required by a computer system to complete a particular taskRate it:

(0.00 / 0 votes)
right to workThe prohibition of union security agreements or closed shops; the prohibition of the requirement that those who take on work in a unionised shop join the union or pay it for representing them.Rate it:

(0.00 / 0 votes)
roll overTo reinvest funds from a maturing financial security in the same or similar investment.Rate it:

(0.00 / 0 votes)
save downTo write a computer file to disk.Rate it:

(0.00 / 0 votes)

We need you!

Help us build the largest human-edited phrases collection on the web!

Alternative searches for exploit (computer security):

Quiz

Are you a phrases master?

»
He bends over _______ to help them.
A forwards
B sideways
C backwards
D downwards

Browse Phrases.com