Software+(37)

Back to Home

|| || || || || ||  || || ||  || || ||  || || || || || ||  || || || ||  || || ||  || || || || Back to Home
 * Air Gap || -is a security measure often taken for computers and computer networks that must be extraordinarily secure. It consists of ensuring that a secure network is completely physically, electrically, and electromagnetically isolated from insecure networks, such as the public Internet or an insecure local area network. ||
 * American Standard Code for Information Interchange (ASCII) || -is a character-encoding scheme based on the ordering of the English alphabet. ASCII codes represent text in computers, communications equipment, and other devices that use text. Most modern character-encoding schemes are based on ASCII, though they support many more characters than did ASCII.
 * Android Package (APK) File || -is a file format and variant of the JAR format, used for the distribution and installation of bundled components onto the Android mobile device platform.
 * Anti-Spyware || -provide real time protection against the installation of spyware software on the computer can be used solely for detection and removal of spyware software that has already been installed onto the computer. The user can schedule weekly, daily, or monthly scans of the computer to detect and remove any spyware software that have been installed on the computer.
 * Anti-Virus || -is used to prevent, detect, and remove computer viruses, worms, and trojan horses. It may also prevent and remove adware, spyware, and other forms of malware.
 * Authentication Factor || -is a piece of information and synonymic for the process used to authenticate or verify the identity of a person or other entity requesting access under security constraints.
 * Basic Input/Output System (BIOS) || -is built into the PC, and is the first code run by a PC when powered on ('boot firmware'). The primary function of the BIOS is to load and start an operating system. When the PC starts up, the first job for the BIOS is to initialize and identify system devices such as the video display card, keyboard and mouse, hard disk, CD/DVD drive and other hardware. The BIOS then locates software held on a peripheral device (designated as a 'boot device'), such as a hard disk or a CD, and loads and executes that software, giving it control of the PC.
 * Biometrics || -is the regulatory definition of true multi-factor authentication. Users may biometrically authenticate via their fingerprint, voiceprint, or iris scan using provided hardware and then enter a PIN or password in order to open the credential vault.
 * Daemon || -is a computer program that runs in the background, rather than under the direct control of a user; they are usually initiated as background processes. In a Unix environment, the parent process of a daemon is often (but not always) the init process (PID=1). Processes usually become daemons by forking a child process and then having their parent process immediately exit, thus causing init to adopt the child process. ||
 * Disk Operating System (DOS) || -refers to an operating system software used in most computers that provides the abstraction and management of secondary storage devices and the information on them (e.g., file systems for organizing files of all sorts). Such software is referred to as a //disk// operating system when the storage devices it manages are made of rotating platters, such as floppy disks or hard disks.
 * Dynamic Link Library (DLL) || -is Microsoft's implementation of the shared library concept in the Microsoft Windows and OS/2 operating systems. These libraries usually have the file extension, (for libraries containing ActiveX controls), or  (for legacy system drivers). The file formats for DLLs are the same as for Windows EXE files — that is, Portable Executable (PE) for 32-bit and 64-bit Windows, and New Executable (NE) for 16-bit Windows. As with EXEs, DLLs can contain code, data, and resources, in any combination.
 * Fail-Safe || -is a device or feature which, in the event of failure, responds in a way that will cause no harm, or at least a minimum of harm, to other devices or danger to personnel.
 * Firewall || -is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria. Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.
 * Handshake || -is an automated process of negotiation that dynamically sets parameters of a communications channel established between two entities before normal communication over the channel begins.
 * Hash Function || -is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that an accidental or intentional change to the data will change the hash value.
 * Intrusion Detection System (IDS) || -is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports.
 * Java Script || -is an implementation of the ECMAScript language standard and is typically used to enable programmatic access to computational objects within a host environment. JavaScript is primarily used in the form of client-side JavaScript, implemented as part of a web browser in order to provide enhanced user interfaces and dynamic websites. However, its use in applications outside web pages—for example in PDF-documents, site-specific browsers and desktop widgets—is also significant.
 * Keypair || -is a pair of cryptographic keys—a public encryption key and a private decryption key.
 * Malware || -is software designed to secretly access a computer system without the owner's informed consent and is hostile, intrusive, or annoying software or program code.
 * Mirroring || -is an exact copy of a data set. On the Internet, a mirror site is an exact copy of another Internet site. Mirror sites are most commonly used to provide multiple sources of the same information, and are of particular value as a way of providing reliable access to large downloads. Mirroring is a type of file synchronization.
 * Multi-Factor Authentication || -means using multiple authentication methods (e.g. password + value from physical token) to increase the assurance that the bearer has been authorized to access secure systems.
 * Network Statistics (netstat) || -is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is used for finding problems in the network and to determine the amount of traffic on the network as a performance measurement.
 * Nslookup || -is a network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record.
 * Operating System (OS) || -is software, consisting of programs and data, that runs on computers and manages the computer hardware and provides common services for efficient execution of various application software and acts as an intermediary between application programs and the computer hardware, although the application code is usually executed directly by the hardware, but will frequently call the OS or be interrupted by it. Operating systems are found on almost any device that contains a computer—from cellular phones and video game consoles to supercomputers and web servers.
 * Patch || -is a piece of software designed to fix problems with, or update a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance. Though meant to fix problems, poorly designed patches can sometimes introduce new problems.
 * Personal Identifiers (PID) || -is a subset of personally identifiable information (PII) data elements that identify a unique individual and can permit another person to “assume” that individual’s identity without their knowledge or consent. ||
 * Program || a sequence of instructions written to perform a specified task for a computer.
 * Packet Sniffer || can intercept and log traffic passing over a digital network or part of a network. ||
 * Ping || -is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer and is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.
 * Private/Public Key || -the publicly available encrypting-key is widely distributed, while the private decrypting-key is known only to the recipient. Messages are encrypted with the recipient's public key and can // only // be decrypted with the corresponding private key. The keys are related mathematically, but the private key cannot feasibly (ie. in actual or projected practice) be derived from the public key.
 * Root || -is a special user account used for system administration and reserved for authorized individuals in order to control abuse, misuse, or other undesired activities by end-users. ||
 * Rootkit || -is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality, other applications and by hiding applications that appropriate computing resources or steal passwords without the knowledge of administrators and users of affected systems. Rootkits can target firmware, a hypervisor, the kernel, or—most commonly—user-mode applications. ||
 * Safe Mode || -is a diagnostic mode of a computer operating system (OS). It can also refer to a mode of operation by application software. //Safe mode// is intended to fix most, if not all problems within an operating system. Safe mode will have reduced functionality, but the task of isolating problems is easier because many non-core components are disabled.
 * Software || -is the collection of computer programs and related data that provide the instructions telling a computer what to do. We can also say software refers to one or more computer programs and data held in the storage of the computer for some purposes.
 * Software as a Service (SaaS) || -is software that is deployed over the internet and/or is deployed to run behind a firewall on a local area network or personal computer. With SaaS, a provider licenses an application to customers either as a service on demand, through a subscription, in a "pay-as-you-go" model, or (increasingly) at no charge. This approach to application delivery is part of the utility computing model where all of the technology is in the "cloud" accessed over the Internet as a service. ||
 * Software Development Kit (SDK) || -is typically a set of development tools that allows for the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar platform. ||
 * User Account Control (UAC) || -is a technology and security infrastructure and aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system. In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not inherit those privileges unless they are approved beforehand or the user explicitly authorizes it.