.

123456789101112131415161718
Across
  1. 2. Server acting as an intermediary.
  2. 4. Embedded software in hardware.
  3. 7. Browser-stored user data.
  4. 9. Faking identity to deceive.
  5. 10. Software that initializes the hardware during the booting process
  6. 11. Hidden folder for user-specific app data.
  7. 12. Network security barrier.
  8. 14. Command-line tool for automation.
  9. 17. Temporary storage for fast access.
  10. 18. Malware disguised as legitimate software.
Down
  1. 1. Classic single-player card game.
  2. 3. Classic game featuring Inky, Blinky, Pinky and Clyde
  3. 5. This program is widely used for graphic design and photo manipulation.
  4. 6. Digital key for authentication
  5. 8. Test to differentiate humans from bots.
  6. 10. Data rate in media streams.
  7. 12. Mozilla's open-source browser
  8. 13. Original Name of Google Search Engine
  9. 15. Data transformed into a fixed-length string.
  10. 16. Delay in network communication.