Tuesday, December 21, 2010
Address Book
An Address book is a database of email addresses, phone numbers, and other contact credentials.
Saturday, December 18, 2010
Wireless Internet Service Providers (WISP)
Wireless Internet Service Providers (WISP) are Internet service providers with networks built around wireless networking.
Friday, December 17, 2010
WiMax
WiMax is a new technology that provides internet pretty much anywhere you go by connecting your computer to base towers similar to cell-phone technology.
Wide Area Network (WAN)
A Wide Area Network (WAN) is a network that isn't limited and can extend up to 30 miles.
T1
T1 is the generic designator for any of several digitally multiplexed telecommunications carrier systems
Server Operating System
A Server Operating System is an Operating System that is completely dedicated to providing services to other clients on the network. They have advanced server daemons and programs and security designed for server programs.
Server Operating System
A Server Operating System is an Operating System that is completely dedicated to providing networking services. They contain server programs, security designed specifically for servers, etc.
Server
A Server is a computer or program that provides a network service that gives a resource to a user.
Routers
Routers are computer hardware that intercepts all transmission and determines where they go. These are used for LAN's and allow multiple users to connect to one device.
Public Switched Telephone Network
Public Switched Telephone Network (PSTN) or Plain Old Telephone System (POTS) is just a network of internet telephones.
Proxy Server
A Proxy Server is a server (hardware or software) that acts as a middle man between clients and servers. Some uses for proxy servers are for circumventing parental controls, enforcing parental controls, logging data transmission, remaining anonymous, and for data caching
Peer-to-Peer Network
A Peer-to-Peer Network is a network where there is no central server that computers have to connect to. All the nodes act as clients and servers
Local Area Network (LAN)
A Local area network is a network that is in a limited geographical area like a home or workplace
Intranet
A Intranet is a private network that allow people logged on to that network to exchange information
Internet
The internet is the global system of networks connected to each others. It is referred to as the network of networks. It was said to originally be a weapon of the Military.
Hacker
A Hacker in computing can be looked at in many ways. One way a hacker can be looked at is a criminal who knows about computer systems, networking, exploit development, programming, and other misc. knowledge that is needed to take over a network and who uses that knowledge to break into systems. Another perspective of hacker can be someone who knows little about computer science and hacking and uses scripts and tools off the internet to hack into other computers. Yet another outlook of a hacker can be someone who has a stupendous knowledge on computers but uses it to teach others about computers and networking and to improve security.
Firewall
A Firewall is either a piece of hardware or a software program that blocks unnecessary open ports to prevent malicious vandals from breaking into the network. These ports should be blocked because a vandal can break in by exploiting a bug in the port's service. If the cyber-criminal is determined and smart enough, he/she can write an exploit script to take advantages of any bugs that the firewall seems to have.
Digital Subscriber Line (DSL)
A Digital Subscriber Line (DSL) is technology that provides services for transmission between different networks
Communication Channel
A Communication Channel either refers to a physical communication device like a wire or a software based communication device such as a radio channel
Client/Server Network
A Client/Server Network is where the client machine boots to another computer, called the server, and has that server do the work for the client
Client
A Client is either a hardware or software utility that connects to another computer called a service
Cable Modem
Biometric Security Measures
A Biometric Security Measure is a special kind of counter measure against malicious crackers that require you to input some biological information into the system to authorize the user.
Subscribe to:
Posts (Atom)