Skip to Main Content
Apply
Quicklinks
Search
A-Z Index
BengalWeb
Campus Map
Directory
Email
Events
Library
Moodle
News
Give
Admissions
Students
Faculty & Staff
Parents
Alumni & Visitors
Academic Calendar
Academic Catalogs
Administration
Advising
Athletics
Campus Security
Career Center
Class Schedule
Colleges & Departments
Financial Aid
Health & Wellness
Housing
Human Resources
Jobs
Museum of Natural History
Parking
Registrar
Scholarships
Transcripts
Tuition
Majors
Cost
Visit
Parking
Map
Apply
Give
Search
Common Searches
BengalWeb
Bookstore
Academic Calendar
Directory
COVID-19
Jobs
Human Resources
Moodle
Calendar
Tuition
JavaScriptMessages
NIATEC
National Information Assurance Training and Education Center
News
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
M
M
MAC
MAC (Media Access Control)
Macdink
Machinable
Machine Cryptosystem
Machine Instruction
Machine Language
Machine Learning
Machine Word
Machine-Oriented Language
Machine-Readable Medium
Machoflops
Macintoy
Macintrash
Macro
Macrology
Macros
Macrotape
Maggotbox
Magic
Magic Cookie
Magic Number
Magic Smoke
Magnetic Card
Magnetic Core Storage
Magnetic Disk
Magnetic Disk Unit
Magnetic Drum
Magnetic Drum Unit
Magnetic Field
Magnetic Field Intensity
Magnetic Flux
Magnetic Flux Density
Magnetic Media
Magnetic Oxide
Magnetic Remanence
Magnetic Saturation
Magnetic stripe card
Magnetic Tape
Magnetic Tapes
Mail host
Mail server
Mail server antivirus program
Mail Storm
Mailbomb
Mailbox
Mailing List
Main firewall
Main Loop
Mainframe
Maintainability
Maintenance
Maintenance Hook
Maintenance Key
Maintenance Of Configuration Documentation
Maintenance Procedures, Contract Employee
Maintenance Procedures, Local Employee
MAJCOM
MAJCOM C4 Systems Security Office
MAJCOM Computer System Security Manager
MAJCOM Computer System Security Manager (MCSSM)
Major incidents
Major Information System
Malicious Code
Malicious links
Malicious Logic
Malicious payload
Malicious software (Malware)
Malware (malicious software)
MAN
MAN (Metropolitan Area Network)
Managed security service provider (MSSP)
Management
Management Control Process
Management Information System
Management Of The Security Function
Manchester Encoding
Mandatory
Mandatory Access
Mandatory Access Control
Mandatory Access Control (MAC)
Mandatory Access Controls
Mandatory default algorithms
Mandatory Modification
Mandatory Protection
Mandatory vacations
Mandelbug
Manged
Mangle
Mangler
Mango
Man-in-the-middle attack
Manipulation Detection
Manipulative
Manipulative Communications Deception
Manual Cryptosystem
Manual Remote
Manual Remote Rekeying
Manularity
MAPLESS
Marbles
Marginal
Marginal Hacks
Marginally
Mark
Marketroid
Marking
Marking Of Media
Marking Of Sensitive Information
Marking Pulse
Marking Signal
Mars
Martian
M-Ary Code
MASINT
Mask
Masquerade
Masquerading
Massage
Master Crypto-Ignition Key
Master key
Master Station
Match index
Matching Programs
Material
Material Symbol
Math-Out
Matrix
MATSYM
Maximum Access Time
Maximum Maytag Mode
Mbogo, Dr. Fred
MBSA
MCCB
MCCR
MCSSM
MCTL
MD5
MD5 CHAP
MDC
Measure Of Effectiveness
Measurement And Signature Intelligence
Meatware
Media
Media Access Control (MAC)
Media Convergence
Mediation
Medium
Medium Access Control Sublayer
Meeces
MEECN
Meg
Mega
Megapenny
MEGO
Meltdown, Network
Member server
Meme
Meme Plague
Memetics
Memory
Memory (Non-Volatile)
Memory (Random)
Memory (Sequential)
Memory (Volatile)
Memory Address Translation Unit
Memory Bounds
Memory Bounds Checking
Memory Leak
Memory Mapping
Memory Page Cache
Memory Smash
Menu
Menuitis
MEP
MER
Message
Message Alignment Indicator
Message Authentication
Message Authentication Code
Message Authentication Codes
Message Broadcast
Message digest
Message Distribution Center
Message Externals
Message Format
Message Handling Systems
Message Indicator
Message integrity
Message Register Leads
Mess-Dos
Meta Bit
Metadata
Metal Particle Tape
Metamorphic viruses
Metasyntactic Variable
Method
Metric
Metrics
Metropolitan Area Network (MAN)
Metropolitan Area Network MAN
MFTL
Mgt
MHS
MHz
MI
MIB
Mickey
Mickey Mouse Program
Micro
Microcode
Microcomputer
Microengine
Microfloppies
Microfortnight
Microinstruction
MicroLenat
Microprocessor
Microprogram
MicroReid
Microsequencer
Microsoft Baseline Security Analyzer (MBSA)
Microsoft Challenge-Handshake Authentication Protocol (MS-CHAP)
Microsoft Management Console (MMC)
Microsoft Point-to-Point Encryption (MPPE)
Microtape
Microwave mw
Microwave/Wireless Communications Security
Middle-Endian
MIJI
Militarily Critical Technology
MilliLampson
MIL-STD
MIME filtering
Mimicking
Minicomputer
Minifloppies
Minimal Protection
Minimizing security burdens
Minor Change
Minor Change To A System Of Records
Minor incidents
MINTERM
MIPR
MIPS
Misbug
Misfeature
Missed'em-Five
Missile Address
Mission-Critical
Mission-Essential Unclassified Information
Miswart
MLS
MMC (Microsoft Management Console)
MOA
Mobile COMSEC Facility
Mobile content
Mobile Workstation Security
Moby
Mockingbird
Mod
Mode
Mode Bit
Mode Of Operation
Modem
Modes Of Operation
Modification
Modularity
Modulo
MOE
Molly-Guard
Mongolian Hordes Technique
Monitor
Monitor Signal
Monitoring
Monitoring (e. g. , Data, Line)
Monkey Up
Monkey, Scratch
Monochromatic
Monographic Processing
Monolithic TCB
Monstrosity
Monty
Moof
Moore's Law
Moose Cal
MOP
More fragments
Moria
MOU
Mouse
Mouse Ahead
Mouse Around
Mouse Belt
Mouse Droppings
Mouse Elbow
Mouso
MPPE (Microsoft Point-to-Point Encryption)
MRK
MRT
MS-DOS
MSE
MTBF
MTR
MTT
Mu
MUD
Muddie
Mudhead
Multichannel Information
Multician
Multics
Multilevel
Multi-Level
Multilevel Device
Multilevel Mode
Multilevel Mode Or Multilevel Security Mode
Multilevel Processing
Multilevel Secure
Multilevel Security
Multilevel Security Mode
Multilevel Systems
Multiple Access
Multiple Access Rights Terminal
Multiple Call
Multiplexing
Multiprocessing
Multiprocessor
Multiprogramming
Multi-pronged attacks
Multi-Satellite Link
Multitask
Multitasking
Multi-User Hosts
Multiuser Mode Of Operation
Multi-User Mode Of Operation
Multi-User Security Mode
Multi-User Security Mode Of Operation
Mumblage
Munch
Munching
Munching Squares
Munchkin
Mundane
Mung
Munge
Murphy's Law
Music
Mutter
Mutual Suspicion
Mutual Synchronization
Mutually Suspicious
Mutually Synchronized Network
MUX
Mw
Macro
/mak'roh/ [techspeak] n. A name (possibly followed by a formal arg list) that is equated to a text or symbolic expression to which it is to be expanded (possibly with the substitution of actual arguments) by a macro expander. This definition can be found in any technical dictionary; what those won't tell you is how the hackish connotations of the term have changed over time. The term `macro' originated in early assemblers, which encouraged the use of macros as a structuring and information-hiding device. During the early 1970s, macro assemblers became ubiquitous, and sometimes quite as powerful and expensive as HLLs, only to fall from favor as improving compiler technology marginalized assembler programming (see languages of choice). Nowadays the term is most often used in connection with the C preprocessor, LISP, or one of several special-purpose languages built around a macro-expansion facility (such as TeX or UNIX's [nt]roff suite). Indeed, the meaning has drifted enough that the collective `macros' is now sometimes used for code in any special-purpose application control language (whether or not the language is actually translated by text expansion), and for macro-like entities such as the `keyboard macros' supported in some text editors (and PC TSR or Macintosh INIT/CDEV keyboard enhancers).
pref. Large. Opposite of micro-. In the mainstream and among other technical cultures (for example, medical people) this competes with the prefix mega-, but hackers tend to restrict the latter to quantification.