loader image
Skip to main content
Completion requirements

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

V

Validator

A node participating in block validation/production in Proof‑of‑Stake systems.

Variable

A named container for storing a value in a program (such as a number, string, or object). Variables help code remember and manipulate information during execution.

VASPs

Virtual Asset Service Providers; businesses such as exchanges, brokers, and custodians subject to AML-related obligations in many regimes.

Version Control

A system for tracking code changes over time (commonly Git). Version control supports collaboration, rollback, code review, and maintaining stable releases of scripts and tools.

Virtual Environment (venv)

An isolated environment that keeps a project’s dependencies separate from system-wide packages. Virtual environments prevent version conflicts and help make Python scripts reproducible across machines.

Virtual Machine (VM)

A software-based emulation of a physical computer running its own operating system. Cloud providers offer VMs as core compute services.

Virtual Memory

A memory management technique that allows systems to use disk storage as an extension of RAM. Virtual memory enables larger address spaces and process isolation.

Virtual Private Cloud (VPC)

A logically isolated virtual network within a cloud provider that allows customers to define IP ranges, subnets, route tables, and security controls.

Volatile Data

Information that can be lost when a system is powered off or changes state, such as running processes, network connections, RAM contents, and certain encryption keys. Investigators balance volatile data capture with legal authority, safety, and evidence preservation requirements.

VPN (Virtual Private Network)

A technology that routes traffic through a third-party server, masking the user’s apparent IP address. VPN use can hinder attribution; investigators may seek provider logs, endpoint artifacts, payment trails, or device-level evidence to link activity to a suspect.