Barracuda Intronis Backup
formerly ECHOplatform
formerly ECHOplatform
exploit
The use of software, data, or commands to 'exploit' a weakness in a computer system or program to carry out some form of malicious intent, such as a denial-of-service attack, Trojan horses, worms, or viruses.