The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet.
Source http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci343029,00.html
Friday, February 25, 2011
Feed
A web feed (or news feed) is a data format used for providing users with frequently updated content.
Source wikipedia
Source wikipedia
Boolean Logic
A complete system for logical operations, used often since popularization of mathematical logic and discussions concerning the foundations of mathematics.
Source Wikipedia
Source Wikipedia
Blog
A blog is a specific kind of website that allows one person to talks or explains a specific thing inside the blog.
Wiki
A wiki is a website that holds information along with the ability to have other people edit the information.
Website
A site that allows use of internet in the world wide web that may contain content like images and videos.
Web Cache
is the caching of web documents (e.g., HTML pages, images) to reduce bandwidth usage, server load, and perceived lag. A web cache stores copies of documents passing through it; subsequent requests may be satisfied from the cache if certain conditions are met.
Source Wikipedia
Source Wikipedia
Web 2.0
Uniform Resource Locator
It is a Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.
Wikipedia
Wikipedia
Really Simple Syndication
RSS is a family of web feed formats used to publish frequently updated works—such as blog entries, news headlines, audio, and video—in a standardized format.
Source: Wikipedia
Source: Wikipedia
Podcast
A podcast is a series of digital media files that are released episodically and often downloaded through web syndication.
Source Wikipedia
Source Wikipedia
IP Address
An Internet Protocol address (IP address) is a usually numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication.
Source Wikipedia
Source Wikipedia
HTTP (HyperText Transfer Protocol)
It is a networking protocol for distributed, collaborative, hypermedia information systems.
Source Wikipedia
Source Wikipedia
Digital Certificate
A Digital Certification is an electronic document which uses a digital signature to bind together a public key with an identity -- information such as the name of a person or an organization, their address.
en.wikipedia.org/wiki/Digital_certification
en.wikipedia.org/wiki/Digital_certification
Cookie
A cookie, also known as a web cookie, browser cookie, and HTTP cookie, is a piece of text stored on a user's computer by their web browser.
Source: Wikipedia
Source: Wikipedia
Client
A client is an application or system that accesses a remote service on another computer system, known as a server, by way of a network.
http://en.wikipedia.org/wiki/Client_%28computing%29
http://en.wikipedia.org/wiki/Client_%28computing%29
Active X
Active X is a framework for defining reusable software components in a programming language independent way.
http://en.wikipedia.org/wiki/ActiveX
http://en.wikipedia.org/wiki/ActiveX
Saturday, February 19, 2011
21) RDF Summary
RSS stands for RDF Site Summary, it provides website content.
http://www.techterms.com/definition/rss
http://www.techterms.com/definition/rss
29) Worm
It is a Malicious software that keeps copying itself, it also does not need to attach itself to a program.
23) Tagging
A tag is a non-hierarchical keyword or term assigned to a piece of information (such as an Internet bookmark, digital image, or computer file).
http://en.wikipedia.org/wiki/Tag_(metadata)
http://en.wikipedia.org/wiki/Tag_(metadata)
26) Trojan Horse
A trojan horse is a virus or any type of malicious software hiding inside a software that may look safe.
25) Time Bomb
A computer program that has been written in such a way that it will stop functioning after a certain fixed date or time is reached.
http://en.wikipedia.org/wiki/Time_bomb_(software)
http://en.wikipedia.org/wiki/Time_bomb_(software)
19)Phishing
A way to get access to important information that is taken by a fake website people believe is real.
18) Netiquette
Netiquette is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums.
http://en.wikipedia.org/wiki/Netiquette
http://en.wikipedia.org/wiki/Netiquette
20) Pyramid Scheme
It is scheme that normally one person manages, who gets money from the people without them realizing.
17) Logic Bomb
A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
http://en.wikipedia.org/wiki/Logic_bomb
http://en.wikipedia.org/wiki/Logic_bomb
12) User Agent
A user agent is a client application implementing a network protocol used in communications within a client–server distributed computing system.
http://en.wikipedia.org/wiki/User_agent
http://en.wikipedia.org/wiki/User_agent
8) Packets
Formatted Unit of Data carried a packet mode computer network.
http://en.wikipedia.org/wiki/Network_packet
http://en.wikipedia.org/wiki/Network_packet
9) Signature
A type signature defines the inputs and outputs for a function, subroutine or method.
http://en.wikipedia.org/wiki/Type_signature
http://en.wikipedia.org/wiki/Type_signature
Subscribe to:
Posts (Atom)