Definition: This is listening with software to the Ethernet interface for packets that interest the user.
When the software sees a packet that fits certain criteria, it logs it to a file.
The most common criteria for an interesting packet is one that contains words like login or password.
Definition: Assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain.
Definition: This happens when more data is put into a buffer or holding area, then the buffer can handle.
This is due to a mismatch in processing rates between the producing and consuming processes. This can result in system crashes or the creation of a back door leading to system access.