Saturday, February 26, 2011
Secure Sockets Layer
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communications security over the Internet.
feed
directories
In computer software, specifically the command line interface of the OpenVMS operating system, the DIRECTORY command is used to list the files inside a directory.
copyright
boolean logic
blog
webapp
In software engineering, a web application is an application that is accessed via a web browser over a network such as the Internet or an intranet.
web cache
Web caching is the caching of web documents HTML pages, images to reduce bandwidth usage, server load, and perceived lag.
Web 2.0
Web 2.0 is associated with web applications that facilitate interactive systemic biases, interoperability, user-centered design, and developing the World Wide Web.
Uniform Resource Locator (URL)
In computing, a Uniform Resource Locator (URL) is a subset of the Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.
social network service
A social network service is an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people.
really simple syndication (RSS)
is a family of web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardized format.
Portal
A web portal, also known as a links page, presents information from diverse sources in a unified way.
Friday, February 25, 2011
Podcast
A podcast or non-streamed webcast is a series of digital media files either audio or video that are released episodically and often downloaded through web syndication.
Mosaic
Mosaic is the web browser credited with popularizing the World Wide Web. It was also a client for earlier protocols such as FTP, NNTP, and gopher.
Internet service provider (ISP)
An Internet service provider (ISP), also sometimes referred to as an Internet access provider (IAP), is a company that offers its customers access to the Internet.The ISP connects to its customers using a data transmission technology appropriate for delivering Internet Protocol packets or frames, such as dial-up, DSL, cable modem, wireless or dedicated high-speed interconnects.
Hypertext Transfer Protocol (HTTP)
The Hypertext Transfer Protocol (HTTP) is a networking protocol for distributed, collaborative, hypermedia information systems.HTTP is the foundation of data communication for the World Wide Web.
Hit
A hit is a request to a web server for a file .When a web page is uploaded from a server the number of "hits" or "page hits" is equal to the number of files requested.
Geographic Imaging
Is any system that captures, stores, analyzes, manages, and presents data that are linked to location. In the simplest terms,is the merging of cartography, statistical analysis, and database technology.
file transfer protocol (FTP)
File Transfer Protocol (FTP) is a standard network protocol used to copy a file from one host to another over a TCP-based network, such as the Internet.
Domain
A domain name is an identification label that defines a realm of administrative autonomy, authority, or control in the Internet. Domain names are also hostnames that identify Internet Protocol (IP) resources such as web sites. Domain names are formed by the rules and procedures of the Domain Name System (DNS).
Digital Certification
A data file that is issued by a Certification Authority to an individual or organisation to identify them to online services.
Cookie
A cookie, also known as a web cookie, browser cookie, and HTTP cookie, is a piece of text stored on a user's computer by their web browser.
Client
A client is an application or system that accesses a remote service on another computer system, known as a server, by way of a network.
ActiveX
ActiveX is a framework for defining reusable software components in a programming language independent way. Software applications can then be composed from one or more of these components in order to provide their functionality.
Saturday, February 19, 2011
worm
A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes computers on the network and it may do so without any user intervention. This is due to security shortcomings on the target computer.
virus
urban legend
the definitive Internet reference source for urban legends, folklore, myths, rumors, and misinformation. Use the search box above to locate your item of interest, or click one of the icons below to browse the site by category.
trojan horse
A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but perhaps in addition to the expected function steals information or harms the system.
time bomb
In computer software, a time bomb refers to a computer program that has been written so that it will stop functioning after a predetermined date or time is reached. The term "time bomb" does not refer to a program that stops functioning a specific number of days after it is installed; instead, the term "trialware" applies.
teleconferencing
A teleconference or teleseminar is the live exchange and mass articulation of information among several persons and machines remote from one another but linked by a telecommunications system. Terms such as audio conferencing, telephone conferencing and phone conferencing are also sometimes used to refer to teleconferencing.The telecommunications system may support the teleconference by providing one or more of the following: audio, video, and/or data services by one or more means, such as telephone, computer, telegraph, teletype, radio, and television.
tagging
In online computer systems terminology, a tag is a non-hierarchical keyword or term assigned to a piece of information .This kind of metadata helps describe an item and allows it to be found again by browsing or searching. Tags are generally chosen informally and personally by the item's creator or by its viewer, depending on the system.
spam
Spam is the abuse of electronic messaging systems including most broadcast media, digital delivery systems to send unsolicited bulk messages indiscriminately.
RDF summary
pyramid scheme
A pyramid scheme is a non-sustainable business model that involves the exchange of money primarily for enrolling other people into the scheme, without any product or service being delivered. Pyramid schemes are a form of fraud.
phishing
Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information.
netiqutte
Netiquette is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
logic bomb
hoax
This usually consists of an email message warning recipients about a new and terribly destructive virus. It ends by suggesting that the reader should warn his or her friends and colleagues, perhaps by simply forwarding the original message to everyone in their address book.
fraud
filtering
In signal processing, a filter is a device or process that removes from a signal some unwanted component or feature. Filtering is a class of signal processing, the defining feature of filters being the complete or partial suppression of some aspect of the signal.
Windows mail
User agent
In computing, a user agent is a client application implementing a network protocol used in communications within a client–server distributed computing system. The term most notably refers to applications that access the World Wide Web, but other systems, such as the Session Initiation Protocol (SIP), use the term user agent to refer to both end points of a communications session.
text messaging
Text messaging, or texting, refers to the exchange of brief written messages between fixed-line phone or mobile phone and fixed or portable devices over a network. While the original term was derived from referring to messages sent using the Short Message Service (SMS) originated from Radio Telegraphy, it has since been extended to include messages containing image, video, and sound content known as MMS messages.
spam
signature
A signature is a handwritten and sometimes stylized depiction of someone's name, nickname, or even a simple "X" that a person writes on documents as a proof of identity and intent.
packets
This is a small amount of computer data sent over a network. Any time you receive data from the Internet, it comes to your computer in the form of many little packets.
Subscribe to:
Posts (Atom)