Saturday, February 19, 2011

worm

a software program capable of reproducing itself that can spread from one computer to the next over a network.

virus

a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer;

urban legend

An apocryphal story involving incidents of the recent past, often including elements of humor and horror, that spreads quickly and is popularly believed to be true.

tagging

is a non-hierarchical keyword or term assigned to a piece of information (such as an internet bookmark, digital image, or computer file).

RDF summary

RDF summary is method of providing website content such as news stories or software updates in a standard XML format.

pyramid schemes

Such activities as the transfer of information or solicitation of persons via the Internet in an attempt to extort money or other valuables 

phishing

is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication

netiquette

refers to etiquette on the Internet. Good netiquette involves respecting others' privacy and not doing anything online that will annoy or frustrate other people. 

logic bomb

when exploded it may delete or corrupt data, or print a spurious message, or have other harmful effects

hoax

a deliberate attempt to deceive or to trick people into believing or accepting something which the hoaxer (the person or group creating the hoax) knows is false.

fraud

 Web sites that provide venues for advertisers

filter


filters the world of online entertainment and information, personalising it for each individual (establish in 2006)

windows mail

is an e-mail and newsgroup client included in Windows Vista, that was superseded by Windows Live Mail.

user agent

is a client application implementing a network protocol used in communications within a client-server distributed computing system.

text message

exchange of brief written messages between mobile phones over cellular networks

spam

send unwanted or a junk e-mail.

signature

 Is a way of describing the parameters and parameter types with which a legal call to the function can be made

packet

a packet is a formatted unit of data carried by a packet mode computer network.

mailing list

a list of names and addresses to which advertising material is mailed

instant messaging

is a form of real-time direct text-based communication between two or more people using shared clients.

e-mail address

An e-mail address identifies an email box to which e-mail messages may be delivered.

electronic mail

(E-Mail) most commonly abbreviated email and e-mail, is a method of exchanging digital messages

distribution list

list of names to whom a communication should be sent

attachment

 A device attached to a machine or implement

archiving

Archives contain primary source documents that have accumulated over the course of an individual or organization's lifetime.

address book

 (1) (second word set)   It features various syncing features and integrations into the rest of the OS.

Saturday, February 12, 2011

WiMAX

Meaning Worldwide Interoperability for Microwave Access, is a telecommunications technology that provides wireless transmission of data using a variety of transmission modes

Wide area Network (WAN)

Connects network in a large area (state, province, or country).

T-1 Line

High-speed digital connection that transmits data at 1.5 million bits per second through the telephone-switching network. 

Server Operating System

An operating system design for network use.

server

a computer program that has associated client program this might run on the same computer.

Router

A network device that forwards packets from one network to another.

Public Switched Telephone Network (PSTN)

The worldwide voice telephone network.

proxy server

using a proxy server, an organization can improve the network performance and filter what users connected to the network can access.This is a server that all computers on the local network have to go through before accessing information on the Internet

Peer-Peer Network

It's an approach to computer network where all computers share responsibility for translating data

Node

A connecting point at which several lines come together(terminal,computer, and hub are all Node)

modem

Electronic equipment consisting of a device used to connect computers by a telephone line.

Local Area Conector (LAN)

It's a group of computers which all belong to the same organisation like buildings,schools or home and are linked within a small area using the same network.(they can share documents,printer,and server)

intranet

("intra" means "within") Intranet is an internal or private network that can only be accessed within the confines of a company, university, or organization. 

Internet

the internet was invented in 1969 by the U.S military and it was meant to be a "nuke-proof" communications network.(the consists of countless networks and computers and it allows to share information world wide)

Hub

 
Is a hardware device that is used to network multiple computers together(you can connect more then two PC together)

hacker

A program who breaks into PC systems in order to steal, change or destroy information.

firewall

Is a system designed to prevent unauthorized access to or from a private network

Extranet

Is a private network that uses Internet and the public telecommunication system to securely share part of a business's information or operations.

Digital Subscriber Line (DSL)

(DSL) it is the medium for transferring data over regular phone lines and can be used to connect to the Internet.

communication channels

Also known as  "circuit" or "line," it is a pathway in where data are transferred between remote devices.

client server network

One of the involved parties acts as a client and the other acts as a server.

Client

Any PC that is hooked up to a computer network.

Cable Modem

Its a hook up for a PC to a local cable TV.

Biometric Security Measures

Its used to identify a specific person by using fingerprints, facial pattern,eye retinas and its also used for security.