Saturday, February 19, 2011
worm
a software program capable of reproducing itself that can spread from one computer to the next over a network.
virus
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer;
urban legend
An apocryphal story involving incidents of the recent past, often including elements of humor and horror, that spreads quickly and is popularly believed to be true.
tagging
is a non-hierarchical keyword or term assigned to a piece of information (such as an internet bookmark, digital image, or computer file).
RDF summary
RDF summary is method of providing website content such as news stories or software updates in a standard XML format.
pyramid schemes
Such activities as the transfer of information or solicitation of persons via the Internet in an attempt to extort money or other valuables
phishing
is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication
netiquette
refers to etiquette on the Internet. Good netiquette involves respecting others' privacy and not doing anything online that will annoy or frustrate other people.
logic bomb
when exploded it may delete or corrupt data, or print a spurious message, or have other harmful effects
hoax
a deliberate attempt to deceive or to trick people into believing or accepting something which the hoaxer (the person or group creating the hoax) knows is false.
filter
windows mail
is an e-mail and newsgroup client included in Windows Vista, that was superseded by Windows Live Mail.
user agent
is a client application implementing a network protocol used in communications within a client-server distributed computing system.
signature
Is a way of describing the parameters and parameter types with which a legal call to the function can be made
instant messaging
is a form of real-time direct text-based communication between two or more people using shared clients.
archiving
Archives contain primary source documents that have accumulated over the course of an individual or organization's lifetime.
address book
(1) (second word set) It features various syncing features and integrations into the rest of the OS.
Saturday, February 12, 2011
WiMAX
Meaning Worldwide Interoperability for Microwave Access, is a telecommunications technology that provides wireless transmission of data using a variety of transmission modes
T-1 Line
High-speed digital connection that transmits data at 1.5 million bits per second through the telephone-switching network.
proxy server
using a proxy server, an organization can improve the network performance and filter what users connected to the network can access.This is a server that all computers on the local network have to go through before accessing information on the Internet
Local Area Conector (LAN)
It's a group of computers which all belong to the same organisation like buildings,schools or home and are linked within a small area using the same network.(they can share documents,printer,and server)
intranet
("intra" means "within") Intranet is an internal or private network that can only be accessed within the confines of a company, university, or organization.
Internet
the internet was invented in 1969 by the U.S military and it was meant to be a "nuke-proof" communications network.(the consists of countless networks and computers and it allows to share information world wide)
Hub
Is a hardware device that is used to network multiple computers together(you can connect more then two PC together)
Extranet
Is a private network that uses Internet and the public telecommunication system to securely share part of a business's information or operations.
Digital Subscriber Line (DSL)
(DSL) it is the medium for transferring data over regular phone lines and can be used to connect to the Internet.
communication channels
Also known as "circuit" or "line," it is a pathway in where data are transferred between remote devices.
Biometric Security Measures
Its used to identify a specific person by using fingerprints, facial pattern,eye retinas and its also used for security.
Subscribe to:
Posts (Atom)