Browse Definitions :
  • January 29, 2006 29 Jan'06

    hash buster

    A hash buster is a program that generates a string of text for insertion in a spam message so that, to a spam filter, the e-mail appears to be a different message each time it is sent.  Continue Reading

  • January 29, 2006 29 Jan'06

    teergrube

    A teergrube (German for tar pit) is a computer server set up to be intentionally slow, as a trap for spammers using address harvesting programs.  Continue Reading

  • January 28, 2006 28 Jan'06

    list washing

    In the language of spam, list washing is the process of removing an e-mail address from a mailing list when the recipient either requests removal or complains to the sender's ISP (Internet service provider) that he is being spammed.  Continue Reading

  • January 28, 2006 28 Jan'06

    operand

    In computers, an operand is the part of a computer instruction that specifies data that is to be operating on or manipulated and, by extension, the data itself.  Continue Reading

  • January 28, 2006 28 Jan'06

    spamhaus

    A spamhaus (haus is the German word for house) is an Internet service provider (ISP) or other business that allows the distribution of unsolicited commercial e-mail (UCE).  Continue Reading

  • January 28, 2006 28 Jan'06

    orphan file

    On a computer's hard drive, an orphan file is a support file (such as a DLL file) that no longer serves a purpose because the "parent" application it is associated with has been moved or uninstalled.  Continue Reading

  • January 28, 2006 28 Jan'06

    going forward

    Going forward is a relatively new and apparently convenient way to indicate a progression in time from the present.  Continue Reading

  • January 28, 2006 28 Jan'06

    firefighting

    Firefighting is an emergency allocation of resources, required to deal with an unforeseen problem.  Continue Reading

  • January 27, 2006 27 Jan'06

    Fast Guide to Job Hunting and Career Resources

    Quick look-up for finding resources about career and job hunting.  Continue Reading

  • January 27, 2006 27 Jan'06

    Virtual Earth

    Virtual Earth is a Web-based, interactive geographical guide that allows users to search and observe maps and aerial photographs of specific areas, neighborhoods, and points of interest on the earth's surface.  Continue Reading

  • January 27, 2006 27 Jan'06

    mousepad

    A mousepad is a small, portable surface that sometimes provides better traction for the ball on a computer mouse and, at the very least, provides a bounded area in which to move the mouse.  Continue Reading

  • January 27, 2006 27 Jan'06

    mouse miles

    "Mouse miles" is slang for user time at the computer (as in "I travelled a lot of mouse miles this week") and also an actual measure of how much activity a computer mouse has had over time.  Continue Reading

  • January 27, 2006 27 Jan'06

    Learning Path: Operating Systems and Applications

    A progressive list of terminology to teach yourself about operating systems and applications.  Continue Reading

  • January 27, 2006 27 Jan'06

    Learning Path: malware

    A progressive list of terminology to teach yourself about malware including words about Trojans, viruses and worms.  Continue Reading

  • January 27, 2006 27 Jan'06

    Learning Path: CRM (Customer Relationship Management)

    A progressive list of terminology to teach yourself about CRM.  Continue Reading

  • January 27, 2006 27 Jan'06

    Learning Path: Basic Computer Concepts

    A progressive list of terminology to teach yourself about computer basics.  Continue Reading

  • January 27, 2006 27 Jan'06

    toolbar

    In the graphical user interface (GUI) for a computer, a toolbar is a horizontal row or vertical column of selectable image "buttons" that give the user a constantly visible reminder of and an easy way to select certain desktop or other application ...  Continue Reading

  • January 27, 2006 27 Jan'06

    certification

    In information technology as in other fields such as teaching, accounting, and acupuncture, certification is a formal process of making certain that an individual is qualified in terms of particular knowledge or skills.  Continue Reading

  • January 27, 2006 27 Jan'06

    spreadsheet

    A spreadsheet is a sheet of paper that shows accounting or other data in rows and columns; a spreadsheet is also a computer application program that simulates a physical spreadsheet by capturing, displaying, and manipulating data arranged in rows ...  Continue Reading

  • January 27, 2006 27 Jan'06

    IEEE 1394

    IEEE 1394, High Performance Serial Bus, is an electronics standard for connecting devices to your personal computer.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close