What is pwning?

Topic: Security
Answer this Question


2 total
Vote Up (18)

If you ever play me in a game online, it will be when im in ur base killin ur d00dz.

Vote Up (13)

It began in the early days of online gaming, when someone who meant to say that a player has been "owned" (dominated) had a typo that came out pwn. It caught on from there. Pronounced "Poned" or "Pone" (rhyme with owned) rather than "Pawned", which you might thing given the spelling.

In terms of the cyber-security world, pwn means to be able to hack/crack a system, as seen in the "Pwn2Own" computer hacking contest held by the CanSecWest security conference.

Ask a question

Join Now or Sign In to ask a question.
The increased adoption of mobile, social and cloud computing is driving growth in security spending among organizations that are also becoming more aware of threats on all those fronts.
In the wake of recent security breaches of medical databases, doctors can’t be too careful
A security precaution skipped in mobile applications such as Facebook's Messenger could be abused to make an expensive phone call at a victim's expense, a developer contends.
The U.S. National Institute of Standards and Technology (NIST) is developing a guide for testing third-party apps to ensure that they are secure and don't introduce any vulnerabilities.
With a Microsoft-mandated deadline a little more than two months away, computer makers are still selling PCs equipped with Windows 7 Home Premium.
Many businesses focus on record retention, but here's why one lawyer says "Destroy!"
With a single massive power burst, storage media that suddenly heads south, or interaction with a light-fingered ne'er-do-well, the technology your student depends on can vanish. Take these five tips to heart, however, and the loss of a device or data need not be catastrophic.
U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.
A type of body scanner in wide use across U.S. airports through last year fails to spot well-concealed weapons including guns and knives, computer security researchers contend.
A modified version of Android uses a system of modularized plugins to help make sure the latest security tools make it into the hands of end users as quickly as possible.