Browse Definitions:

Browse File Extensions by Alphabet

HFB - HIZ

  • HFB - Ralcgm File
  • HFB - Hell Fighter Battle File...
  • HFC - Unknown file extension
  • HFD - HotDocs Form Document
  • HFI - HP font info (GEM)
  • HFO - Hollywood FX Object File...
  • HFP - Harry 's Filters Filter ...
  • HFS - Macintosh disk image file
  • HFT - HaftiX Cross - Stitch ...
  • HFT - HotDocs Form Template
  • HFV - Simulated Macintosh ...
  • HFX - US Robotics Rapid Comm ...
  • HFX - Harvard Graphics F/X ...
  • HFX - Pinnacle Hollywood FX ...
  • HFX - Hollywood FX Special ...
  • HFX - HotFax data
  • HFZ - HollywoodFX Plug -In ...
  • HG - HP Graphics Language ...
  • HG1 - Hellgate London save ...
  • HGC - PC Fold Molecule ...
  • HGH - PDP-10 high segment file
  • HGH - Star Wars - Tie Fighter ...
  • HGL - Drawing file (HP ...
  • HGP - HighGrow Plant File
  • HGS - Harvard Graphics : ...
  • HGS - HighGrow Virtual Seed ...
  • HGT - Shuttle Radar Topography...
  • HGT - NASA SRTM Terrain Data ...
  • HGT - Battle Zone Data File
  • HH - Header file (C++)
  • HH - Help system map (Generic)
  • HHA - HyperHub Archive ( ...
  • HHC - Microsoft HTML Help ...
  • HHC - HTML Help Table of ...
  • HHC - TurboTax Contents File
  • HHC - HTML Help Table of ...
  • HHF - Hand Held file. Used by ...
  • HHG - THHG EUROPEAN HEADQUARTER
  • HHH - Precompiled header (...
  • HHK - HTML Help Workshop Index...
  • HHK - HTML Help Index ( ...
  • HHK - MS HTML Help Index
  • HHL - Visual Basic file
  • HHP - Help information for ...
  • HHS - HyperHub Subkit ( Oracle...
  • HHS - HTML Help sample file
  • HHSL - Hockey High Score List ...
  • HHT - Help and Support Center ...
  • HHTML - Realmedia adstream html ...
  • HI - Descent 2 high score file
  • HI - Spy-CD CD search index ...
  • HI - High Scores
  • HI - High scores file
  • HI1 - Spy-CD CD Search ...
  • HI2 - Spy-CD CD Search ...
  • HI4 - Spy-CD CD Search ...
  • HIA - Spy-CD CD Search ...
  • HIB - Spy-CD CD Search ...
  • HIC - HicEst Script ( Georg ...
  • HID - Sony Ericsson Remote ...
  • HID - Sony Ericsson ...
  • HID - Help ID file
  • HIF - Quicken Intuit Online ...
  • HIF - Quicken On- line File ( ...
  • HIG - High scores ( various ...
  • HIG - High Scores
  • HIH - Spy-CD CD Search ...
  • HIL - Hi HelpIndex language ...
  • HIL - Deluxe Ski Jump 3 Hill ...
  • HIM - Spy-CD CD Search ...
  • HIN - HyperChem Molecule File ...
  • HIN - Spy-CD CD Search ...
  • HIN - Hyperchem HIN chemical ...
  • HIN - HyperChem molecule
  • HIN - Hyperchem HIN chemical ...
  • HIP - HiP compressed file ...
  • HIP - Houdini Project File
  • HIP - Spy-CD CD Search ...
  • HIP - HiP Compressed File
  • HIPC - Hippel - COSO Music ...
  • HIPNC - Houdini Apprentice File
  • HIPS - Bitmap Graphic
  • HIPS - Bitmap image
  • HIQ - Spy-CD CD Search ...
  • HIR - Hidden Icon Resource file
  • HIR - Hires C64 image format
  • HIR - C64 Hires Bitmap Graphic
  • HIR - Unknown Apple II File
  • HIREX - HIREx Data Specification
  • HIS - DN History of Executing ...
  • HIS - Insight II Dyncamics ...
  • HIS - SOBEK Simulation History...
  • HIS - Spy-CD CD Search ...
  • HIS - History of executing / ...
  • HIT - Audio file (HitPlayer)
  • HIV - TiANWEi RegShot Registry...
  • HIV - W32/SillyFDC-AS (worm)
  • HIW - Spy-CD CD Search ...
  • HIX - System SYSUTIL File
  • HIX - System Utility File

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close