Computer Forensics
Definition: See Forensic Also Known As: Forensic
Computer Forensics Read More »
Definition: When used to discuss Internet security, it does not mean that two parties come to a mutually beneficial agreement. Rather, it means that the security of your computer or network is weakened. A typical security compromise can be a
Definition: A circuit-level gateway is a type of firewall. All internal computers establish a “circuit” with the proxy server. The proxy server performs all communications with the Internet. External computers only see the IP address of the proxy server and
Circuit-Level Gateway Read More »
Definition: ‘c2c Only’ is a shorthand acronym used in IRC (Internet Relay Chat)or instant messaging which stands for “cam to cam only”. The term is used when one individual asks another to allow them to see them over the Web
Definition: In computer technology, a bug is a coding error in a computer program. After a product is released or during public beta testing, bugs are still apt to be discovered. When this occurs, users have to either find a
Definition: Technically broadband is used to define any transmission which can carry more than one channel on a single medium. For instance, the coaxial cable for your cable TV carries many channels and can simultaneously provide Internet access. Broadband is
Definition: A blacklist is a list of addresses, typically IP addresses, but could also pertain to email addresses among other things, which is rejected or denied access by default. A blacklist of IP addresses known to distribute spam is often
Definition: Biometrics is a form of authentication using unique physical traits of the user. Unlike a password, a hacker cannot guess your fingerprint or retinal scan pattern. Biometrics is a relatively new term used to refer to fingerprinting, retinal scans,
Definition: Designed by Microsoft and intended as a legitimate component of the Internet Explorer web browser, browser helper objects (BHO), have been targeted by hackers and malware authors as a means of compromising systems. The “feature” can be used against