Browse Definitions :

Browse File Extensions by Alphabet

AES - AGF

  • AES - AES Crypt encrypted file
  • AES - AE Stabilizer settings ...
  • AES - After Effects Stablilzer...
  • AES - ACEIT ACE exec scenario ...
  • AET - MusicaZip lyrics file
  • AET - FreeBSD file
  • AET - After Effects Tracker ...
  • AET - Adobe After Effects ...
  • AEU - AutoRoute Express Europe...
  • AEU - MS AutoRoute Express ...
  • AEX - Armored extracted public...
  • AEX - Alpha Five Compiled ...
  • AEX - Pretty Good Privacy (PGP...
  • AEX - Alpha Five linked ...
  • AEX - Greeting card
  • AEXPK - Pretty Good Privacy (PGP...
  • AEXPK - Armored extracted public...
  • AF - 3DPlus2 Model ( Serif )
  • AF - 3D Plus2 Model
  • AF2 - ABC FlowCharter 2.0 ...
  • AF3 - ABC Flowchart
  • AFA - Astrotite 200X Data ...
  • AFB - Alphacam Flame VB Macro ...
  • AFC - Apple Sound file
  • AFD - Prismo Graphics ...
  • AFD - Alphacam Flame Drawing (...
  • AFD - ArisFlow Diagram
  • AFF - Acorn vector draw file
  • AFF - iSpell affixes ...
  • AFF - Nvu file
  • AFF - Affix File
  • AFF - AnyForm form file
  • AFF - Affix file Header
  • AFF - AGEMA File
  • AFF - Advanced Forensics ...
  • AFG - Guitar Musik trainer file
  • AFI - Truevision Bitmap graphic
  • AFL - X- Plane Airfoils
  • AFL - RubberFlex animation
  • AFL - AnimaFlex RubberFlex ...
  • AFL - XMap ( Delorme )
  • AFL - Font file (for Always ) ...
  • AFL - Lotus Font (IBM)
  • AFM - Adobe metrics
  • AFM - HP NewWave Cardfile ...
  • AFO-XVID - Compressed video file
  • AFP - Prismo Graphics ...
  • AFP - Androsa FileProtector ...
  • AFP - Advanced Function ...
  • AFP - XMap Flight Plan or ...
  • AFP - IBM Transactional Data ...
  • AFP - Gangsters game file
  • AFP - Papyrus Document Storage...
  • AFP - Shape palette
  • AFP - Flowchart Symbol Palette
  • AFP - Alphacam Flame Post ( ...
  • AFP - ABC FlowCharter shape ...
  • AFP - FileProtector Encrypted ...
  • AFPLOC - Apple Filing Protocol ...
  • AFPP - AppleShare Prep File
  • AFR - FreeBSD file
  • AFS - Filter Factory Photoshop...
  • AFS - Sega Dreamcast ...
  • AFS - Type Manager Font Set ( ...
  • AFS - Adobe Type Manager font ...
  • AFS - AktivFilter ...
  • AFS - STAAD. foundation ...
  • AFS - FreeBSD file
  • AFS - Aire Freshener schedule ...
  • AFS3 - AFS 3 Basic encrypted ...
  • AFS3 - Advanced File Security ...
  • AFT - Ancestry.com Family Tree...
  • AFT - Template
  • AFT - Ancestry Family Tree ...
  • AFT - Micrografx ABC ...
  • AFT - Family Tree data file
  • AFW - Bullion firmware file
  • AFW - Workplace - ABC ...
  • AFW - Industrial Aspect ...
  • AFW - Flowcharter Work area ...
  • AFX - Auto F/X image format
  • AFX - Auto FX Photo / Graphic ...
  • AFZ - Geneology Backup File
  • AFZ - Ancestry Family Tree ...
  • AG - Applix graphic
  • AG4 - Access G4 File ( ...
  • AG4 - Access G4 file
  • AGA - Agenda File
  • AGC - AfterGRASP Compiled ...
  • AGC - Compiled script file
  • AGD - AgileGraph data file
  • AGD - Agile Advantage E- mail ...
  • AGD - Agile Advantage file
  • AGD1 - Freehand 5 (PC ext: FH5)
  • AGD1 - MAC file type (PC ...
  • AGD2 - Freehand 7 File
  • AGDB - ANSYS DesignSpace
  • AGE3SCN - Age of Empires III
  • AGE3SCN - Age of Empires 3 ...
  • AGE3YREC - Age Of Empires III ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close