c2c Only
Definition: ‘c2c Only’ is a shorthand acronym used in IRC (Internet Relay Chat)or instant messaging which stands for “cam to cam only”. The term is used when one individual asks another to allow them to see them over the Web […]
Definition: ‘c2c Only’ is a shorthand acronym used in IRC (Internet Relay Chat)or instant messaging which stands for “cam to cam only”. The term is used when one individual asks another to allow them to see them over the Web […]
Definition: In computer technology, a bug is a coding error in a computer program. After a product is released or during public beta testing, bugs are still apt to be discovered. When this occurs, users have to either find a
Definition: Technically broadband is used to define any transmission which can carry more than one channel on a single medium. For instance, the coaxial cable for your cable TV carries many channels and can simultaneously provide Internet access. Broadband is
Definition: A blacklist is a list of addresses, typically IP addresses, but could also pertain to email addresses among other things, which is rejected or denied access by default. A blacklist of IP addresses known to distribute spam is often
Definition: Biometrics is a form of authentication using unique physical traits of the user. Unlike a password, a hacker cannot guess your fingerprint or retinal scan pattern. Biometrics is a relatively new term used to refer to fingerprinting, retinal scans,
Definition: Designed by Microsoft and intended as a legitimate component of the Internet Explorer web browser, browser helper objects (BHO), have been targeted by hackers and malware authors as a means of compromising systems. The “feature” can be used against
Definition: A backdoor is a secret or undocumented means of getting into a computer system. Many programs have backdoors placed by the programmer to allow them to gain access to troubleshoot or change the program. Some backdoors are placed by
Definition: The backbone of the Internet is the collection of major communications pipelines that transfer the data from one end of the world to the other. Larger ISP’s such as Comcast and Verizon make up the backbone. They connect through
Definition: One of the keys in determining if the message or file you are receiving is safe is to first authenticate that the person who sent it is who they say they are. Authentication is the process of determining the