Browse Definitions :

Browse File Extensions by Alphabet

ASS - ATR

  • ASS - Aegisub Advanced ...
  • ASS - ASS I/O file
  • ASS - Assistance for the blind...
  • ASS - Advanced SubStation ...
  • ASS - SubStation Alpha ...
  • ASS - Assembler / Disassembler...
  • ASS - Flash
  • ASS - Assistance for the blind
  • ASSOC - Associate This File ...
  • ASSP - MAC file type
  • ASST - MAC file type
  • AST - Astound multimedia file
  • AST - Claris Works "assistant"...
  • AST2 - Astrotite ( Fantiusen ...
  • ASV - DataCAD Autosave file
  • ASW - Authorware Star - ...
  • ASWCS - avast ! antivirus skin ...
  • ASWCS - Avast ! Compressed Skin
  • ASWCS - avast ! Antivirus Skin (...
  • ASWS - avast ! Antivirus Skin (...
  • ASWS - Avast ! Skin File
  • ASX - Microsoft Advanced ...
  • ASX - Cheyenne Backup script
  • ASX - Video file
  • ASXML - AudioPlayer XML Music ...
  • ASY - LTspice IV circuit ...
  • ASZ - LoseThos Assembly Source...
  • ASZ - Skin - AltDesk
  • AT - Rescue Disk file
  • AT2 - Aldus Persuasion 2.0 ...
  • AT3 - WinControl DCX- AT3000 ...
  • AT3 - Airport Tycoon - Version...
  • AT3 - ATRAC3 Audio File
  • AT3 - Playstation audio file
  • AT3 - Airport Tycoon Version 3...
  • AT5 - Marine electronic chart
  • AT5 - AirMap file
  • AT5 - Lowrance Map File
  • AT65 - MAC file type
  • AT_ - Audio Utility Winatb ...
  • ATA - Antenna Project ( Julian...
  • ATA - Antenna project Header
  • ATAK - Soundscape Audio - Take ...
  • ATAK1A - Soundscape Audio - Take ...
  • ATAK4D - Soundscape Audio - Take ...
  • ATARI - ST Graphics Formats
  • ATB - Alphacam Lathe VB Macro ...
  • ATB - AnetHelp Tools file ...
  • ATB - TechMed Annotation ...
  • ATC - ACUCOBOL - GT Thin ...
  • ATC - Sniffer Capture File ( ...
  • ATC - AceText Collection ( ...
  • ATC - AutoCAD catalog file
  • ATD - Alphacam Lathe Drawing (...
  • ATD - Systems Management ...
  • ATD - Microsoft Systems ...
  • ATE - Office Accounting ...
  • ATF - Photoshop Transfer ...
  • ATF - Canvas duotone curve file
  • ATF - Adobe Photoshop transfer...
  • ATF - Altera design file
  • ATF - Unknown Apple II File
  • ATF - Linux file
  • ATF - Axon text file
  • ATF - Sharp APL Workspace ...
  • ATF - GenePix Axon Text File (...
  • ATF - Photoshop Transfer ...
  • ATF - Aspect TIF file
  • ATH - Athena document (v2.x) ...
  • ATH - Alphacam Lathe Thread ( ...
  • ATH - Athena Document ( Bertil...
  • ATHEME - Amazing clock Theme ( ...
  • ATI - Office Accounting ...
  • ATK - Andrew Toolkit Raster ...
  • ATK - Bitmap image ( Andrew ...
  • ATL - ATP Assembler Source ( ...
  • ATL - AutoTap Log File (B&B ...
  • ATL - Hal file
  • ATL - PROGNOSIS Atlas Document...
  • ATM - Adobe Type Manager data/...
  • ATMC - Adobe Type Manager File
  • ATMC - MAC file type
  • ATMN - Automation Anywhere ...
  • ATMSPHR - ATMoSPHeRe ( TerraGen - ...
  • ATMSPHR - TerragGen Atmosphere ( ...
  • ATN - Visual FoxPro WWW search...
  • ATN - Daqarta Extended Audio ...
  • ATN - Photoshop Actions File
  • ATN - Photoshop Action File ( ...
  • ATN - Adobe Photoshop action -...
  • ATO - Just Burn File ( Sonic ...
  • ATO - ATO Modeler Project File...
  • ATOM - Atom Syndication Format
  • ATOM - Atom web feed Header
  • ATOM - Atom Feed
  • ATOMS - Ribbons atoms file
  • ATP - Automise project file
  • ATP - Alphacam Lathe Post ( ...
  • ATP - Visual Studio.NET ACT ...
  • ATP - Anti Tracks Plug -in ( ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close