Browse Definitions :

Browse File Extensions by Alphabet

ALF - AMD

  • ALF - AdventNet Bean Builder ...
  • ALF - Color Quick Label
  • ALF - AbacusLaw related file
  • ALF - ALF Logic
  • ALF - Abacus Law ( Abacus Data...
  • ALF - Aipro 2000 landfiles
  • ALF - SonicWALL Aventail ...
  • ALF - Cadence Ambit BuildGates
  • ALF - Altium Designer license
  • ALF6 - MAC file type - ...
  • ALG - ARCSOLO Activity Log
  • ALG - PDP-10 ALGOL compiler ...
  • ALG - Netmino file
  • ALG - InRoads Survey alignment...
  • ALG - HDLmaker file
  • ALG - ER Mapper algorithm
  • ALG - Activity Log - ARCSOLO
  • ALH - Aladdin Interactive DSP ...
  • ALH5 - MAC file type - ...
  • ALI - Document file (SAP ...
  • ALIAS - Alias Image
  • ALIGN - Insight II Sequence ...
  • ALL - WordPerfect for Windows ...
  • ALL - Arts & Letters Library
  • ALLOW - Linux access file
  • ALM - Alpha Five database ...
  • ALM - Aley 's Module v1.0 1.1 ...
  • ALM - Aley 's Module v1.1-1.2 ...
  • ALM - AL- Mail file
  • ALM - Alphacam laser parameter...
  • ALMB - Location Manager Module
  • ALMN - Location Manager Module
  • ALN - Grlib Saoimage file
  • ALN - LexNavigator Database ...
  • ALO - Almanac support file
  • ALP - Alphacam Laser Post ( ...
  • ALPHA - Bitmap graphics (raw ...
  • ALPHA - Raw Alpha Bytes Bitmap
  • ALR - ADRIFT Language Resource
  • ALR - VirusScan Alert File ( ...
  • ALR - ADRIFT Language Resource...
  • ALS - Alias Image
  • ALSA - Recorded sound from /dev...
  • ALST - Anarchie Server List
  • ALT - WordPerfect Library Menu
  • ALT3 - MAC file type - template
  • ALT4 - MAC file type
  • ALT5 - Mac file type
  • ALT6 - MAC file type
  • ALTH - MAC file type
  • ALTP - MAC file type
  • ALTQ - MAC file type - settings
  • ALTV - MAC file type - help file
  • ALTV - QuickView File
  • ALV - Canvas image levels file
  • ALV - Photoshop Levels ( Adobe...
  • ALV - Vbox Available Languages...
  • ALV - Adobe Photoshop levels ...
  • ALW - PDP-10 Algol -W Compiler...
  • ALW - A-law G.711 European ...
  • ALX - ActiveX Layout Control ...
  • ALX - Internet script language...
  • ALX - BlackBerry Application ...
  • ALX - Alpha Five database ...
  • ALX - OM2 OMALI plug -in
  • ALX - BlackBerry Application ...
  • ALX - BlackBerry Application ...
  • ALZ - ALZip Compressed File ( ...
  • ALZ - DarkEden game file
  • ALZ - AlZip Compressed Files
  • ALZ - ALZip Archive
  • AM - Advantage database ...
  • AM - Applix SHELF Macro
  • AM1 - Adventure Maker project ...
  • AM1 - Adventure Maker Project ...
  • AM2 - AutoPlay Menu Studio Ver...
  • AM3 - AutoPlay Menu Studio Ver...
  • AM4 - AutoPlay Media Studio 4 ...
  • AM4 - Security First CCTV ...
  • AM4 - AutoPlay Menu Studio Ver...
  • AM5 - AutoPlay Media Studio 5 ...
  • AM5 - AutoPlay Menu Studio Ver...
  • AM6 - AutoPlay Menu Studio Ver...
  • AM6 - AutoPlay Media Studio 6 ...
  • AM7 - AutoPlay Menu Studio ver...
  • AM7 - AutoPlay Media Studio 7 ...
  • AMA - Fifa2000 Feart File
  • AMAYA - Amaya
  • AMAYA - Amaya file
  • AMB - All My Books Book ...
  • AMB - Radiance Ambient File ...
  • AMB - AIMMS Model File
  • AMB - Alphacam 3D Mill 2D Mill...
  • AMC - A.M. Composer 1.2 Music ...
  • AMC - Ant Movie Catalog
  • AMC - AMC media file
  • AMC - Quicktime AMC File
  • AMC - Wireless Analyzer ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close