Bug
Definition: In computer technology, a bug is a coding error in a computer program. After a product is released or during public beta testing, bugs are still apt to be discovered. When this occurs, users have to either find a […]
Definition: In computer technology, a bug is a coding error in a computer program. After a product is released or during public beta testing, bugs are still apt to be discovered. When this occurs, users have to either find a […]
Definition: Technically broadband is used to define any transmission which can carry more than one channel on a single medium. For instance, the coaxial cable for your cable TV carries many channels and can simultaneously provide Internet access. Broadband is
Definition: A blacklist is a list of addresses, typically IP addresses, but could also pertain to email addresses among other things, which is rejected or denied access by default. A blacklist of IP addresses known to distribute spam is often
Definition: Biometrics is a form of authentication using unique physical traits of the user. Unlike a password, a hacker cannot guess your fingerprint or retinal scan pattern. Biometrics is a relatively new term used to refer to fingerprinting, retinal scans,
Definition: Designed by Microsoft and intended as a legitimate component of the Internet Explorer web browser, browser helper objects (BHO), have been targeted by hackers and malware authors as a means of compromising systems. The “feature” can be used against
Definition: A backdoor is a secret or undocumented means of getting into a computer system. Many programs have backdoors placed by the programmer to allow them to gain access to troubleshoot or change the program. Some backdoors are placed by
Definition: The backbone of the Internet is the collection of major communications pipelines that transfer the data from one end of the world to the other. Larger ISP’s such as Comcast and Verizon make up the backbone. They connect through
Definition: One of the keys in determining if the message or file you are receiving is safe is to first authenticate that the person who sent it is who they say they are. Authentication is the process of determining the
Definition: An application gateway is a type of firewall. All internal computers establish a connection with the proxy server. The proxy server performs all communications with the Internet. External computers only see the IP address of the proxy server and
Application Gateway Read More »