War chalking is marking areas, usually on sidewalks with chalk, that receive wireless signals that can be accessed.
War dialing is a simple means of trying to identify modems in a telephone exchange that may be susceptible to compromise in an attempt to circumvent perimeter security.
War driving is the process of traveling around looking for wireless access point signals that can be used to get network access.
Watering hole is a computer attack strategy, in which the victim is a particular group (organization, industry, or region). In this attack, the attacker guesses or observes which websites the group often uses and infects one or more of them with malware. Eventually, some member of the targeted group gets infected.[1][2][3] The malware used in these attacks typically collects information on the user. Hacks looking for specific information may only attack users coming from a specific IP address. This also makes the hacks harder to detect and research. The name is derived from predators in the natural world, who wait for an opportunity to attack their prey near watering holes.
Web application security, is a branch of Information Security that deals specifically with security of websites, web applications and web services. At a high level, Web application security draws on the principles of application security but applies them specifically to Internet and Web systems.
A web of trust is the trust that naturally evolves as a user starts to trust other's signatures, and the signatures that they trust.
The Web Proxy Auto-Discovery Protocol (WPAD) is a method used by clients to locate the URL of a configuration file using DHCP and/or DNS discovery methods. Once detection and download of the configuration file is complete, it can be executed to determine the proxy for a specified URL.
A software process that runs on a host computer connected to the Internet to respond to HTTP requests for documents from client web browsers.