Part of the Computing fundamentals glossary:

In a computer or a network, a ferret is a program that searches through selected files, databases, or search engine indexes for information that meets specified search criteria. The term derives from the name of a small furry animal, commonly a pet, that burrows under things. On the Internet, a ferret can forward a request simultaneously to a number of search engine sites and filter the results according to user-specified or program-designed guidelines.

Next Steps

Ferrets can be written to search a specific group of World Wide Web search engine sites, Usenet news groups, global e-mail directories, Internet Relay Channel ( IRC ) member lists, and any public, searchable database that can be efficiently selected.

A ferret should not be confused with a crawler , a program that search engines use to gather data from many Web pages that is then indexed for search retrieval.

This was last updated in April 2005
Posted by: Margaret Rouse

Related Terms

Definitions

  • glocalization

    - Glocalization is the concept that in a global market, a product or service is more likely to succeed when it is customized for the locality or culture in which it is sold.  (SearchCIO.com)

  • computer forensics (cyber forensics)

    - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a cou... (SearchSecurity.com)

  • GPU (graphics processing unit)

    - A graphics processing unit (GPU) is a computer chip that performs rapid mathematical calculations, primarily for the purpose of rendering images. (SearchVirtualDesktop.com)

Glossaries

  • Computing fundamentals

    - Terms related to computer fundamentals, including computer hardware definitions and words and phrases about software, operating systems, peripherals and troubleshooting.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question
  • THREE (3) Security Concerns

    1. A firewall is a highly recommended. [A href="http://www.zonealarm.com"]ZoneAlarm[/A] may fit your needs. I would also recommend entering passwords and other credentials on websites with https://...

  • Restoring original files in Windows XP Professional

    It is illegal to run unlicensed sw on any OS. The message is often shown when u use crack or like other illegal sw to overcome the 30 days evaluation or trial period. Though I am providing the solu...

  • Exchange 2007, duplicate emails to outside contacts

    Hi, It is possible you have overlapped secuirty groups in a way that cuases this issue. I would recommend distribution groups for easier user managment instead. Otherwise, the only way to avoid ...

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.