NET Frameworks
The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.
ASP - Active Server Pages
Access
Access Privileges
Active Hyperlink
A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking on
the hyperlink.
Administrator (as an IT resource)
IT Resource Management allows organizations to analyze, monitor and anticipate
the utilization and performance of the IT infrastructure by providing an enterprisewide view of IT services and resources.
Authentication
is the act of establishing
or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This
might involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one.
Data Administrator
Electronic Commerce
Electronic
Government (eGovernment)
Encryption
encryption is
the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext).
Information Technology
Information Technology Resource (IT Resource)
A resource used for electronic storage, processing or transmitting
of any data or information, as well as the data or information itself.
Intellectual property rights (IPR)
are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law.
ISO
Malicious Code
Malicious code (also called vandals)
is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone.
Malware (virus) Detection
Software
Malware, a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying
software or program code
Patch
is a Unix program that updates text files according to instructions contained in a separate file, called a patch file. The patch file
(also called a patch for short) is a text file that consists of a list of differences and is produced by running the
related diff program with the original and updated file as arguments.
Purge
Purge
is the sequel to the Future vs. Fantasy total conversion mod for Quake.[Purge is set place in a world where magic fights against technology.
Remote Access
Remote access can refer
to remote desktop, remote terminal (like telnet) or any type of remote application (including remote browser).
Social Engineering
Spoofing
is
a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate
advantage.
Strong Encryption
Encryption is the process of changing data into a form that
can be read only by the intended receiver. To decipher the message, the receiver of the encrypted data must have the proper
decryption key (password).
UserID
On Unix-like operating systems, users are identified within the kernel by an unsigned integer value called a user identifier, often abbreviated to UID or User
ID. The range of its values varies amongst different systems; at the very least, a UID is a 15-bit integer, ranging
between 0 and 32767.
|