In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message. Headers and metadata are sent only...
3 KB (326 words) - 04:08, 17 April 2025
vehicle, often an aircraft or spacecraft. Payload may also refer to: Payload (computing), several analogous usages a game mode in Team Fortress 2 and other...
581 bytes (112 words) - 19:15, 5 June 2024
Computer worm (redirect from Computer worm payload)
pass through. However, as the Morris worm and Mydoom showed, even these "payload-free" worms can cause major disruption by increasing network traffic and...
24 KB (2,746 words) - 09:26, 2 June 2025
data transmission, the data following the header is sometimes called the payload or body. It is vital that header composition follows a clear and unambiguous...
2 KB (325 words) - 16:30, 27 February 2025
In computing, a trojan horse (or simply trojan; often capitalized, but see below) is a kind of malware that misleads users as to its true intent by disguising...
19 KB (1,865 words) - 14:43, 18 April 2025
NaN (section Payload operations)
in computing systems. The square root of a negative number is not a real number, and is therefore also represented by NaN in compliant computing systems...
30 KB (3,755 words) - 00:04, 16 May 2025
digit is computed as follows: Drop the check digit from the number (if it's already present). This leaves the payload. Start with the payload digits. Moving...
9 KB (984 words) - 00:22, 30 May 2025
IPsec (redirect from Encapsulating Security Payload)
In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure...
44 KB (5,337 words) - 03:03, 15 May 2025
common goal for their work. The terms "concurrent computing", "parallel computing", and "distributed computing" have much overlap, and no clear distinction...
57 KB (6,666 words) - 18:52, 16 April 2025
Hacker (redirect from Hacker (computing))
Artificial Intelligence Laboratory. The concept expanded to the hobbyist home computing community, focusing on hardware in the late 1970s (e.g. the Homebrew Computer...
41 KB (4,311 words) - 17:19, 14 June 2025
In computing, load balancing is the process of distributing a set of tasks over a set of resources (computing units), with the aim of making their overall...
49 KB (6,559 words) - 10:27, 8 May 2025
In distributed computing, a conflict-free replicated data type (CRDT) is a data structure that is replicated across multiple computers in a network, with...
29 KB (3,385 words) - 14:27, 5 June 2025
User Datagram Protocol (redirect from UDP (computing))
mandatory in most cases in IPv6. Data: Variable The payload of the UDP packet. The method used to compute the checksum is defined in RFC 768, and efficient...
22 KB (2,789 words) - 14:22, 6 May 2025
Ping (networking utility) (section Payload)
allows ping to compute the round-trip time in a stateless manner without needing to record the time of transmission of each packet. The payload may also include...
19 KB (2,069 words) - 13:15, 31 May 2025
Unknown Payload". nextspaceflight.com. Retrieved 20 February 2025. "Worldwide Space Launches". Retrieved 8 August 2024. "Long March 6 | Unknown Payload". nextspaceflight...
125 KB (2,683 words) - 07:39, 16 June 2025
information. Reliably sending a payload of data over a communications network requires sending more than just the payload itself. It also involves sending...
7 KB (831 words) - 15:50, 30 December 2024
In computing, an event is a detectable occurrence or change in the system's state, such as user input, hardware interrupts, system notifications, or changes...
6 KB (626 words) - 08:41, 1 June 2025
White hat (computer security) (redirect from White hat (computing))
Script kiddie Hacking tools Exploit forensics-focused operating systems Payload Social engineering Vulnerability Practice sites HackThisSite Zone-H Malware...
18 KB (1,870 words) - 03:36, 6 June 2025
GEOStar-2 (section Payload support)
provide improved pointing, more payload power, secure communications, higher downlink data rates or enhanced payload computing power. Bus Dimensions (H x W...
11 KB (649 words) - 09:49, 15 June 2025
Commercial Lunar Payload Services (CLPS) is a NASA program to hire companies to send small robotic landers and rovers to the Moon. Most landing sites...
61 KB (5,147 words) - 22:22, 23 March 2025
infrastructure of cloud computing. It is a sub-domain of computer security, network security and, more broadly, information security. Cloud computing and storage...
53 KB (6,671 words) - 06:52, 7 April 2025
Network packet (redirect from Packet (computing))
user data; the latter is also known as the payload. Control information provides data for delivering the payload (e.g., source and destination network addresses...
9 KB (1,176 words) - 18:44, 7 May 2025
In computing, polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact - that is, the code changes...
4 KB (547 words) - 19:04, 7 April 2025
Ethernet frame (section Payload)
words, a data unit on an Ethernet link transports an Ethernet frame as its payload. An Ethernet frame is preceded by a preamble and start frame delimiter...
26 KB (3,290 words) - 22:24, 29 April 2025
UDP packets (including data payload). The Internet checksum is used to detect errors in ICMP packets (including data payload). The checksum calculation...
5 KB (713 words) - 19:24, 18 January 2025
Vulnerability (computer security) (redirect from Weakness (computing))
73–74. "Ask an Ethicist: Vulnerability Disclosure". Association for Computing Machinery's Committee on Professional Ethics. 17 July 2018. Retrieved...
27 KB (3,333 words) - 03:19, 9 June 2025
Steganalysis (section Encrypted payloads)
packages, determine whether or not they have a payload encoded into them, and, if possible, recover that payload. Unlike cryptanalysis, in which intercepted...
7 KB (956 words) - 04:31, 17 October 2023
is the kilogram-kilometre (kgkm), the service of moving one kilogram of payload a distance of one kilometre. kilogram (kg), the standard SI unit of mass...
9 KB (1,023 words) - 17:00, 28 July 2024
indicated in the table entry. A router typically does not look into the packet payload, but only at the layer-3 addresses to make a forwarding decision, plus...
43 KB (4,748 words) - 06:05, 26 May 2025
algorithms. Backdoor (computing) Botnet Computer virus Exploit HackTool.Win32.HackAV MPack (software) Spyware Trojan horse (computing) DarkComet – (Trojan...
6 KB (614 words) - 04:55, 5 June 2025