Browse Definitions :

Browse File Extensions by Alphabet

LGF - LL3

  • LGF - Windows Application Log
  • LGF - Legal Eagle Text File
  • LGF - Logomotion Graphic File ...
  • LGF - Microsoft Windows ...
  • LGF - LeechGet Download ...
  • LGG - Win Applog file
  • LGG - Windows Application Log
  • LGH - HMI Historical Log File
  • LGH - Windows Application Log
  • LGI - Multimedia Logic File
  • LGI - Windows Applog file
  • LGI - Multimedia Logic Digital...
  • LGJ - Win Applog file
  • LGJ - Windows Application Log
  • LGK - Windows Applog file
  • LGK - Windows Application Log
  • LGL - LeechGet Download List
  • LGL - LeechGet download queue ...
  • LGL - Large Graph Layout Edge ...
  • LGM - Windows Application Log
  • LGM - Windows Applog file
  • LGN - Windows Application Log
  • LGN - Windows Applog file
  • LGO - Startup logo (Microsoft ...
  • LGO - Logo file (PaintBrush)
  • LGP - Archive File
  • LGP - Gnu licency text file
  • LGP - Logitech G15 Gaming ...
  • LGP - Logotron SuperLogo File
  • LGQ - Windows Application Log
  • LGR - Windows Applog file
  • LGR - Elasto Mania character ...
  • LGR - Windows Application Log
  • LGS - Windows Application Log
  • LGS - Microsoft Windows ...
  • LGT - Urban Chaos Game File
  • LGT - Logtalk programming ...
  • LGT - The Sims lighting file
  • LGX - Logistix Spreadsheet
  • LGZ - Windows application log ...
  • LH - Morph file
  • LHA - Alternate file suffix ...
  • LHARC - Archiv
  • LHN - Vosub Encrypted ...
  • LHP - Electric Butterfly
  • LHS - Literate Haskell source ...
  • LHTS - The Movies Editor Text ...
  • LHW - Compressed Amiga archive...
  • LIA - P-CAD Schematic Library ...
  • LIB - Library file (Generic)
  • LIB_ - Mac File Type
  • LIBR - Mac File Type
  • LIBRARY - CATIA library file
  • LIC - Interactive Visual Media...
  • LIC - License File
  • LIC - ESET NOD32 Antivirus ...
  • LIC - Borland License File ( ...
  • LICENSES - Visual Studio Licensed ...
  • LICX - Visual Studio License ...
  • LID - Kodak EasyShare Album ...
  • LID - Light Field Description ...
  • LID - Dylan Library ...
  • LID - Maple setup file
  • LID - LabelVision auto ...
  • LIF - Logical Interchange data...
  • LIF - Compressed archive (...
  • LIFE - Game of Life Pattern File
  • LIGHTWAVE - Lightwave 3D layered ...
  • LIM - Compressed archive (...
  • LIN - Line type file (DataCad)
  • LIN - Interactive music ...
  • LINK - Mac File Type
  • LINO - LinoLab Source Code ( ...
  • LINUX - Linux file
  • LIQ - CollegeBAR Bartending ...
  • LIQ - Liquid Tracker Module
  • LIR - Liram Application Save ...
  • LIS - Output file produced by ...
  • LISP - LISP Source Code
  • LISP - LISP translators file
  • LIT - eBook file for Microsoft...
  • LIV - LiveMotions file
  • LIVEREG - Symantec Anti - Virus ...
  • LIVEREG - Symantec Livereg file
  • LIVESUBSCRIBE - Symantec Anti - Virus ...
  • LIX - Logos library system file
  • LIZ - Comprressed list file
  • LJ - Text file (...
  • LJB - Lightjockey Backup ...
  • LK - Database file (OpenSight...
  • LKB - Faverly Data Recorder ...
  • LKD - Pioneer OEL Screensaver ...
  • LKO - Linked object (Microsoft...
  • LKP - Systems Management ...
  • LKS - Learn Key's Real CBT
  • LKT - Lookup Table
  • LKU - T9000 linkable unit
  • LKY - Trojan Troj / Zlob -AGB
  • LL - Preview file
  • LL - Combit List and Label ...

-ADS BY GOOGLE

SearchCompliance

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close