|
yourwindow.to
Upvotes received | 13 |
Downvotes received | 9 |
Karma: | 3 (upvotes-downvotes) |
|
0 earned Badges No badges were found
Definitions (524)
1 |
9
3
techno vandalism
Techno Vandalism is a term used to describe a hacker or cracker who breaks into a computer system with the sole intent of defacing and or destroying its contents. Techno Vandals can deploy 'sniffers' on the Internet to locate soft (insecure) targets and then execute a range of commands using a variety of protocols towards a range of por [..]
Meaning awaits approval from a moderator |
2 |
1
1
privileged user
A User who, by virtue of function, and/or seniority, has been allocated powers within the computer system, which are significantly greater than those available to the majority of users. Such persons will include, for example, the system administrator(s) and Network administrator(s) who are responsible for keeping the system available and may need [..]
Meaning awaits approval from a moderator |
3 |
1
1
suite
A collection of applications, each of which can stand alone, but which have been designed to work together. The most common example is the 'Office Suite' which will include, normally, a Word Processor, a Spreadsheet, a Presentation application, a Personal Organiser / Scheduler, probably an e-mail program, and, in some versions, a databa [..]
Meaning awaits approval from a moderator |
4 |
1
2
ega
Enhanced Graphics Adapter. Old style type of monitor. Great at the time (mid 1980s) - 'full colour' - but now several generations out of date. *** The Information Security Glossary ***
Meaning awaits approval from a moderator |
5 |
1
1
4004
In full the Intel 4004. The world's first microprocessor, released in 1971. The 4004 contained 2300 transistors and was intended for use in a calculator. By comparison, the 1996 Pentium Pro contained 5.5 million transistors, an increase of over 239,000% in 25 years - thereby helping to demonstrate Moore's Law. *** The Information Securi [..]
Meaning awaits approval from a moderator |
6 |
0
0
peripherals
Pieces of hardware attached to a computer rather than built into the machine itself. The term includes Printers, Scanners, Hard Drive Units, Portable drives, and other items which can be plugged into a port. *** The Information Security Glossary ***
Meaning awaits approval from a moderator |
7 |
0
0
physical security
Physical Protection Measures to safeguard the Organisation's systems. Including but not limited to restrictions on entry to premises, restrictions on entry to computer department and Tank, locking/disabling equipment, disconnection, fire-resistant and tamper-resistant storage facilities, anti-theft measures, anti-vandal measures, etc. *** Th [..]
Meaning awaits approval from a moderator |
8 |
0
0
pickling
Archiving a working model of obsolete computer technology so that a machine will be available to read old archive records which were created and stored using that machines' system. Reportedly, Apple Computers have pickled a shrink-wrapped Apple II machine so that it can read Apple II software (if necessary) in the future. *** The Information [..]
Meaning awaits approval from a moderator |
9 |
0
0
ping
'Ping' stands for Packet Internet (or Inter-Network) Groper and is a packet (small message) sent to test the validity / availability of an IP address on a network. The technical term for 'ping' is the Internet Control Message Protocol. Maliciously sending large volumes of 'Pings' to cause difficulties for anyone else [..]
Meaning awaits approval from a moderator |
10 |
0
0
pki
Where encryption of data is required, perhaps between the organisation's internal networks and between clients and representatives, a means of generating and managing the encryption keys is required. PKI, or Public Key Infrastructure, is the use and management of cryptographic keys - a public key and a private key - for the secure transmissi [..]
Meaning awaits approval from a moderator |
To view all 524 definitions, please sign in.