Globbing is a computer feature that expands searches for non-specific filenames using wildcard characters. It can demand a lot of memory and processing power, causing server crashes. Hackers once used globbing to gain access to password-protected accounts, but computers now have protections against this. Some programs support globbing, while others prioritize security.
Globbing, in computer terms, is a fairly important feature in the daily life of most computer users. Globbing refers to a “wildcard” character that allows you to expand searches for non-specific filenames. This was originally a process used when searching for particular files on a personal computer or server. Internet search providers have taken it to new levels to allow users to search quickly and thoroughly.
In the beginning, globbing was used with a character like an asterisk or question mark to expand on what the person was looking for. For example, if the researcher knew that the filename included “wisegeek” with something before or after the term, the person could type “*wisegeek*” and globbing would kick in. The program will then use globbing to find all filenames within that parameter.
One of the downsides of globbing for personal use is the demand for memory and processing power. Requires a lot of available RAM to perform a search successfully. As computers have become more powerful with larger processing units, this memory requirement has become less of an issue.
Globbing was also the culprit for shutting down servers. If many people perform remote lookups that require a lot of memory, a server can become overloaded and crash. While the major search engines have worked hard to have backups in place, a crash can still happen. However, overloaded servers are now more likely to experience a slowdown in the search process than a full system crash.
Once upon a time, hackers used globbing to undermine systems and gain information. Writing programs that continually force a system to perform complex globbing lookups would allow a hacker to wear down a system, forcing the user to be logged in for an extended period of time. If the user logged into something password protected, this gave the attacker time to seek access to the account. Computers have now been programmed with protections against this type of hacking. Most computers will limit the amount of time a server can spend on the glob, or refuse to do so if the wildcard is too generic.
Some computer programs support globbing, some don’t. Those that don’t are trying to increase the security of the program. If a person is writing programming, it is important to look into the need for program globbing before starting the process and then write the program accordingly.
Protect your devices with Threat Protection by NordVPN