Saturday, February 26, 2011

Secure Sockets Layer

Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communications security over the Internet.

feed

feed is a family of web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardized format.

directories

In computer software, specifically the command line interface of the OpenVMS operating system, the DIRECTORY command is used to list the files inside a directory.

copyright

is the relatively recent extension of copyright law to machine readable software. While many of the legal principles and policy debates concerning software copyright have close parallels in other domains of copyright law, there are a number of distinctive issues that arise with software.

boolean logic

Boolean Logic is considered to be the basic of digital electronics. A computer’s most basic operation is based on digital electronics. Most operations which only humans could do, is now being done by computers.

blog

A blog is a type of website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse-chronological order.

wiki

A wiki system is usually a web application that runs on one or more web servers.

webapp

In software engineering, a web application is an application that is accessed via a web browser over a network such as the Internet or an intranet.

web cache

Web caching is the caching of web documents HTML pages, images to reduce bandwidth usage, server load, and perceived lag.

Web 2.0

Web 2.0 is associated with web applications that facilitate interactive systemic biases, interoperability, user-centered design, and developing the World Wide Web.

Uniform Resource Locator (URL)

In computing, a Uniform Resource Locator (URL) is a subset of the Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.

social network service

A social network service is an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people.

really simple syndication (RSS)

is a family of web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardized format.

Portal

A web portal, also known as a links page, presents information from diverse sources in a unified way.

Friday, February 25, 2011

Podcast

A podcast or non-streamed webcast is a series of digital media files either audio or video that are released episodically and often downloaded through web syndication.

Mosaic

Mosaic is the web browser credited with popularizing the World Wide Web. It was also a client for earlier protocols such as FTP, NNTP, and gopher.

Internet service provider (ISP)

An Internet service provider (ISP), also sometimes referred to as an Internet access provider (IAP), is a company that offers its customers access to the Internet.The ISP connects to its customers using a data transmission technology appropriate for delivering Internet Protocol packets or frames, such as dial-up, DSL, cable modem, wireless or dedicated high-speed interconnects.

Hypertext Transfer Protocol (HTTP)

The Hypertext Transfer Protocol (HTTP) is a networking protocol for distributed, collaborative, hypermedia information systems.HTTP is the foundation of data communication for the World Wide Web.

hypertext markup language (MTML)

its the predominant markup language for web pages.

Home Page

A World Wide Web page set up as an introductory page by an organisation or individual.

Hit

A hit is a request to a web server for a file .When a web page is uploaded from a server the number of "hits" or "page hits" is equal to the number of files requested.

Geographic Imaging

Is any system that captures, stores, analyzes, manages, and presents data that are linked to location. In the simplest terms,is the merging of cartography, statistical analysis, and database technology.

file transfer protocol (FTP)

File Transfer Protocol (FTP) is a standard network protocol used to copy a file from one host to another over a TCP-based network, such as the Internet.

Domain

A domain name is an identification label that defines a realm of administrative autonomy, authority, or control in the Internet. Domain names are also hostnames that identify Internet Protocol (IP) resources such as web sites. Domain names are formed by the rules and procedures of the Domain Name System (DNS).

Digital Certification

A data file that is issued by a Certification Authority to an individual or organisation to identify them to online services.

Cookie

A cookie, also known as a web cookie, browser cookie, and HTTP cookie, is a piece of text stored on a user's computer by their web browser.

Client

A client is an application or system that accesses a remote service on another computer system, known as a server, by way of a network.

ActiveX

ActiveX is a framework for defining reusable software components in a programming language independent way. Software applications can then be composed from one or more of these components in order to provide their functionality.

Saturday, February 19, 2011

worm

A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes computers on the network and it may do so without any user intervention. This is due to security shortcomings on the target computer.

virus

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability.

urban legend

the definitive Internet reference source for urban legends, folklore, myths, rumors, and misinformation. Use the search box above to locate your item of interest, or click one of the icons below to browse the site by category.

trojan horse

A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but perhaps in addition to the expected function steals information or harms the system.

time bomb

In computer software, a time bomb refers to a computer program that has been written so that it will stop functioning after a predetermined date or time is reached. The term "time bomb" does not refer to a program that stops functioning a specific number of days after it is installed; instead, the term "trialware" applies.

teleconferencing

A teleconference or teleseminar is the live exchange and mass articulation of information among several persons and machines remote from one another but linked by a telecommunications system. Terms such as audio conferencing, telephone conferencing and phone conferencing are also sometimes used to refer to teleconferencing.The telecommunications system may support the teleconference by providing one or more of the following: audio, video, and/or data services by one or more means, such as telephone, computer, telegraph, teletype, radio, and television.

tagging

In online computer systems terminology, a tag is a non-hierarchical keyword or term assigned to a piece of information .This kind of metadata helps describe an item and allows it to be found again by browsing or searching. Tags are generally chosen informally and personally by the item's creator or by its viewer, depending on the system.

spam

Spam is the abuse of electronic messaging systems including most broadcast media, digital delivery systems to send unsolicited bulk messages indiscriminately.

RDF summary

The resource disciption framework (RDF) is a family of World Wide Web Consortium specifications originally designed as a metadata data model. It has come to be used as a general method for conceptual description or modeling of information that is implemented in web resources, using a variety of syntax formats.

pyramid scheme

A pyramid scheme is a non-sustainable business model that involves the exchange of money primarily for enrolling other people into the scheme, without any product or service being delivered. Pyramid schemes are a form of fraud.

phishing

Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information.

netiqutte

Netiquette is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.

logic bomb

A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.

hoax

This usually consists of an email message warning recipients about a new and terribly destructive virus. It ends by suggesting that the reader should warn his or her friends and colleagues, perhaps by simply forwarding the original message to everyone in their address book.

fraud

Internet fraud refers to the use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. Internet fraud can occur in chat rooms, email, message boards or on websites.

filtering

In signal processing, a filter is a device or process that removes from a signal some unwanted component or feature. Filtering is a class of signal processing, the defining feature of filters being the complete or partial suppression of some aspect of the signal.

Windows mail

Windows Mail is an e-mail and newsgroup client included in Windows Vista, that was superseded by Windows Live Mail. It is the successor to Outlook Express.

User agent

In computing, a user agent is a client application implementing a network protocol used in communications within a client–server distributed computing system. The term most notably refers to applications that access the World Wide Web, but other systems, such as the Session Initiation Protocol (SIP), use the term user agent to refer to both end points of a communications session.

text messaging

Text messaging, or texting, refers to the exchange of brief written messages between fixed-line phone or mobile phone and fixed or portable devices over a network. While the original term was derived from referring to messages sent using the Short Message Service (SMS) originated from Radio Telegraphy, it has since been extended to include messages containing image, video, and sound content known as MMS messages.

spam


Spam is the abuse of electronic messaging systems including most broadcast media, digital delivery systems to send unsolicited bulk messages indiscriminately.

signature

A signature is a handwritten and sometimes stylized depiction of someone's name, nickname, or even a simple "X" that a person writes on documents as a proof of identity and intent.

packets

This is a small amount of computer data sent over a network. Any time you receive data from the Internet, it comes to your computer in the form of many little packets.