Monday, February 21, 2011

Trojan horse


Allows a hacker remote access to a target computer system.

Time bomb


professionally manufactured, either separately or as part of the device.


Teleconference


A conference held among people in different locations by means of telecommunications equipment, such as closed-circuit television.

Tagging


To identify images or text within their site as a categories or topic. Web pages and blogs with identical tags can then be linked together allowing users to search for similar or related content.

RDF summary


An XML format used to syndicate news, blog posts, forum threads, and other content among different web sites. Many newer browsers contain features that allow you to retrieve and view RSS feeds.

pyramid scheme


a message containing a list of names. You're expected to send money to the first person on the list, cross the first name off, add your name at the bottom, and distribute copies of the message.

Phishing


an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients.

Netiquette


Conferencing between two or more users on an online service or the Internet.

Logic Bomb


an unauthorized program that is inserted into a computer system; when activated it interferes with the operation of the computer.

Hoax


Phony virus warnings delivered via e-mail just to upset as many people as possible. Considering the speed with which messages can be copied and sent electronically.

Fraud


committed with the aid of, or directly involving, a data processing system and networks.

Filtering


is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.

Windows Mail


The e-mail and newsgroup in Windows Vista. Windows Mail replaced Outlook Express, which has been the light version of the Outlook mail client in previous versions of Windows.

User agent


The application which a request to a Web server or other Internet application.

Text message


A short message that contains only text.

Spam


electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages

signature


Extra data appended to a message which identifies and authenticates the sender and message data using public-key encryption.

Packet


Unit of data that is routed between an origin and a destination on the Internet or any other packet switching network. When any file ( e-mail message, Resource Locator request, and so forth) is sent from one place to another on the Internet.

Mailing list


for Internet users to keep up with topics they're interested in. Many software producers and other vendors are now using them as a way to keep in touch with customers.

instant messaging


  1. The transmission of an electronic message over a computer network using software that immediately displays the message in a window on the screen of the recipient.

e-mail address


the address to which the email is sent. For a sender each (outgoing) email should identify the sender's email address (to allow for replies).

e-mail


A system for sending and receiving messages electronically over a computer network, as between personal computers.


Distribution List


a database containing an ordered array of items ; names or topics.

Attachment


A file attached to an email message as an enclosure. It sends as a duplicate of the original file, and is a superior alternative to faxing.

Archiving


A file containing one or more files in compressed format for more efficient storage and transfer.

Address Book


A feature of e-mail systems is the ability to create personal and corporate address books, perhaps importing them from other applications, for use in addressing outgoing mail.

Sunday, February 13, 2011

Wireless LAN


links two or more devices using some wireless distribution method as well as providing a connection through an access point to the wider internet.

Wireless Internet Service Providers (WISPs)


networks built around wireless networking

Wimax


A communications technology that uses radio spectrum to transmit tens of megabits per second in bandwidth between digital devices such as laptop computers.

wide area network (WAN)


is a computer network that covers a broad area.

T-1 line


High-speed digital connection that transmits data at 1.5 million bits per second through the telephone-switching network.


server operating systems


networking features such as Internet Connection Sharing (ICS). Some operating system software (such as Windows 98, Second Edition, and later versions)

Server


a computer that provides services used by other computers. For example a web server serves up web pages.

Router


a device that connects two networks - frequently over large distances. It understands one or more network protocols. A Router accepts packets on at least two network interfaces, and forwards packets from one interface to another.

public switched telephone network (PSTN)


It consists of telephone lines, microwave transmission links, cellular networks, and undersea telephone cables all inter-connected by switching centers which allows any telephone in the world to communicate with any other.

Proxy Server


a computer network service which allows clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server.

peer-peer network


computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.

Node


an be a computer or some other device, such as a printer. Every node has a unique network address.

local area conector


A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office or building.


Intranet


computer network that can be accessed only by authorized persons, especially members or employees of the organization that owns it.


Saturday, February 12, 2011

internet


the single worldwide computer network that interconnects other computer networks, on which end-user services, such as World Wide Web sites or data archives, are located, enabling data and other information to be exchanged.

Hub

computing a device for connecting computers in a network

Hacker

a microcomputer user who attempts to gain unauthorized access to computer systems.

a microcomputer user who attempt

Firewall


either hardware of software based, limits the data and protects a networking server.

Extranet


it extends the internal network.

Digital Subscriber Line (DSL)


Transferring data over regular phone lines and also used to connect to the internet.

Communication Channels


when data are transferred between remote devices. It may refer to the entire physical medium, such as a telephone line, optical fiber, coaxial cable or twisted wire pair, or, it may refer to one of several carrier frequencies transmitted simultaneously within the line.

Server Network


provides various shared resources to other servers on a computer network. That shared resources can include disk space, hardware access, and e-mail services.

Client


is a server, access the database.

Cable Modem


Connects to the internet, supporting data.