Saturday, February 19, 2011

30) Worm.

A computer worm is a self-replicating Malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer.

29) Virus.

 a computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability.

28) Urban Legend.

A type of legend told as a factual incident that happened to someone known by the teller, and its often passed on through media such as newspapers and the Internet as well as orally.

27) Trojan Horse.

A program designed to breach the security of a computer system while ostensibly performing some innocuous function.

26) Time Bomb.

A time bomb refers to a computer program that has been written so that it will stop functioning after a predetermined date or time is reached. 

25) teleconferencing.

Technology that permits individuals to participate in regional, national or worldwide meetings without actually leaving their local area; the live transmission of video or audio signals.

24) Tagging.

Tag - In online computer systems terminology, a tag is a non-hierarchical keyword or term assigned to a piece of information (such as an internet bookmark, digital image, or computer file). This kind of metadata helps describe an item and allows it to be found again by browsing or searching.

23) Spam.

22) RDF Summary.

RDF (Resource Description Framework) is a framework for metadata that provides interoperability between applications that exchange machine understandable data on the Web.

21) Pyramid Schemes.

A pyramid scheme is a non-sustainable business model that involves the exchange of money primarily for enrolling other people into the scheme, without any product or service being delivered. Pyramid schemes are a form of fraud.

20) Phishing.

A site that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering personal information, for the purpose of identity thief or Maybe via email or a link from another site.

19) Netiquette.

Netiquette is the correct or acceptable way of communicating on the Internet.

18) Logic Bomb.

itsis a computer program that lies dormant for a period of time in a systems and is triggered by an event, such as a date.

16) Fraud.

The crime of obtaining money or some other benefit by deliberate deception

17) hoax.

A hoax is a deliberate attempt to deceive or trick people into believing or accepting something which the hoaxer (the person or group creating the hoax) knows is false.

15) Filtering.

A filter is a computer program to process a data stream.
Some operating systems such as Unix are rich with filter programs. 

14) Windows Mail.

Windows Mail is an e-mail and newsgroup client included in Windows Vista, that was superseded by Windows Live Mail. 

13) User Agent.

A user agent is a piece of software that interprets Web documents for a user. Examples of user agents are browsers on PCs, cell phones or PDAs, and screen readers.

12) Text Messaging.

Text messaging, also known as "texting", refers to the exchange of brief written messages between mobile phones over cellular networks.

11) Spam

Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) .

10) Signature

signature of a function is a way of describing the parameters and parameter types with which a legal call to the function can be made. It contains the name of the function, its parameters and their type, and the return value.

9) Packets.

A packet is a formatted unit of data carried by a packet mode computer network. 

8) Mailing List.

Its a list of the names and addresses of people to whom material such as advertising matter, information, or a magazine may be mailed.

7) Instant Messaging.

Instant Messaging means The exchange of typed messages between computer users in real time via the Internet.

6) e-mail Address.

This is where electronic mail is received. It is a combination of a user name and a host name, such as yourname@cns-internet.com

5) Electronic Mail (e-mail)

 Electronic mail is a method of transmitting text messages and files digitally over communication links and it also allows users to exchange mail with people all over the world via a unique address.

4) Distribution List.

Distribution list is a term sometimes are   used for a function of email clients where lists of email addresses are used to email everyone on the list at once.

3) Attachment

A computer file appended to an e-mail.

2) Archiving.

Archiving means to store important information for a long period of time in some recording media such as magnetic tapes.

1) Address Book.

Address Book is an address book for Apple's Mac OS X. It features various syncing features and integrations into the rest of the OS.

Friday, February 11, 2011

Biometric Security Measures.

A security science where body or physical attributes are used for secure identification and authentication. Some of the common Biometric identifiers are fingerprints, voice patterns, face geometry, hand geometry, retinal scans, signatures, and typing patterns.

Wireless Lan (WLAN).

Wireless local-area networks (WLAN or wireless LAN) use radio waves to connect a user device to a LAN, which extends an existing wired local area network.

Wireless Internet Service Provider (WISP).

Wireless Internet Service Providers (WISPs) are Internet service providers with networks built around wireless networking. 

WiMax.

telecommunications technology providing wireless data, voice and video over long distances.

Wide area Network (WAN)

A wide area network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries.

T-1 Line.

An application server is a software framework dedicated to the efficient execution of procedures (programs, routines, scripts) for supporting the construction of applications. The term was originally used when discussing early client–server systems to differentiate servers that run SQL services[1] and middleware servers from file servers.

Server.

An application server is a software framework dedicated to the efficient execution of procedures (programs, routines, scripts) for supporting the construction of applications.

Router.

Routers forward data packets across computer networks. A Router checks the data packet for its destination address and protocol format details.

Public Switched Telephone Network (PSTN).

The public switched telephone network (PSTN) is the network of the world's public circuit-switched telephone networks. It consists of telephone lines, fiberoptic cables, microwave transmission links, cellular networks, communications satellites, and undersea telephone cables all inter-connected by switching centers which allows any telephone in the world to communicate with any other.

Proxy Server.

a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol.

Peer-Peer Network.

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or work loads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes.

Node.

In data communication, a physical network node may either be a data circuit-terminating equipment (DCE) such as a modem, hub, bridge or switch; or a data terminal equipment (DTE) such as a digital telephone handset, a printer or a host computer.

Modem.

A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used over any means of transmitting analog signals, from driven diodes to radio.


Local Area Connection( LAN).

Local area network (redirect from Local area network (LAN))
A local area network (LAN) is a computer network that connects computers and devices in a limited geographical area such as home, school, etc.

Internet.

The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.

Hub.

Hyperlink-Induced Topic Search (HITS) (also known as Hubs and authorities) is a link analysis algorithm that rates Web pages.

Hacker.

A hacker is a person in one of several distinct (but not completely disjoint) communities and subcultures.

Firewall.

Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.

Extranet.

An extranet is a computer network that allows controlled access from the outside, for specific business or educational purposes. An extranet can be viewed as an extension of a company's intranet that is extended to users outside the company, usually partners, vendors, and suppliers.


Digital Subscriber Line (DSL)

Digital Subscriber Line (DSL) is a family of technologies that provides digital data transmission over the wires of a local telephone network. DSL originally stood for digital subscriber loop. In telecommunications marketing, the term Digital Subscriber Line is widely understood to mean Asymmetric Digital Subscriber Line (ADSL), the most commonly installed technical variety of DSL.

Communication Channels

Any gesture, action, sound, written word, or visual image used in transmitting messages.