The most common security protocol used on the World Wide Web and commonly known as SSL. It was originally developed by the Netscape Corporation, but is now supported by all the major browsers . It is a flexible protocol that is able to use a variety of encryption schemes ranging from those suitable for domestic use to those which can be used for the highest classified government data interchange.
Saturday, December 25, 2010
Feed
Copyright
boolean Logic
A complete system for logical operations, used in many systems. It was named after George Boole, who first defined an algebraic system of logic in the mid 19th century. Boolean logic has many applications in electronics, computer hardware and software, and is the basis of all modern digital electronics
Blog
Webapp
Is an application that is accessed over a network such as the Internet or an intranet. The term may also mean a computer software application that is hosted in a browser-controlled environment or coded in a browser-supported language (such as JavaScript, combined with a browser-rendered markup language like HTML) and reliant on a common web browser to render the application executable.
Website
Web Cache
Web 2.0
An umbrella term for the second wave of the World Wide Web, which was coined in a conference on the subject in 2004 by O'Reilly Media and CMP Media (later taking its parent name of United Business Media). Sometimes called the "New Internet" as well as "Internet 2.0," Web 2.0 is not a specific technology; rather, it refers to two major paradigm shifts.
Uniform Resource Locator (URL)
Social Networking Site
Really Simple Syndication(RSS)
Portal
Podcast
Tuesday, December 21, 2010
Mosaic
Internet Service Provider (ISP)
Company that provides Internet connections and services to individuals and organizations. For a monthly fee, ISPs provide computer users with a connection to their site, as well as a log-in name and password. They may also provide software packages, e-mail accounts, and a personal Web site or home page.
Hypertext Transfer Protocol (HTTP)
Hypertext Markup Language (MTML)
Home Page
Geographic Imaging
As GIS can be thought of as a system, it digitally creates and "manipulates" spatial areas that may be jurisdictional, purpose or application oriented for which a specific GIS is developed. Hence, a GIS developed for an application, jurisdiction, enterprise, or purpose may not be necessarily interoperable or compatible with a GIS that has been developed for some other application, jurisdiction, enterprise, or purpose.
File Transfer Protocol (FTP)
Domain
Digital Certificate
Electronic credit card intended for on-line business transactions and authentications on the Internet. Digital certificates are issued by certification authorities. They typically contain identification information about the holder, including the person's public key used for encrypting and decrypting messages, along with the authority's digital signature, so that the recipient can verify with the authority that the certificate is authentic.
Cookie
Client
A computer or program that can download files for manipulation, run applications, or request application-based services from a file server.
ActiveX
Saturday, December 18, 2010
Worm
Virus
Urban Legend
Trojan Horse
Time bomb
In computer software, a time bomb refers to a computer program that has been written so that it will stop functioning after a predetermined date or time is reached. The term "time bomb" does not refer to a program that stops functioning a specific number of days after it is installed; instead, the term trialware applies.
Teleconferencing
RDF Summary
Pyramid schemes
A fraudulent moneymaking scheme in which people are recruited to make payments to others above them in a hierarchy while expecting to receive payments from people recruited below them. Eventually the number of new recruits fails to sustain the payment structure, and the scheme collapses with most people losing the money they paid in.
Phishing
Phish is an Internet scam designed to trick the recipient into revealing credit card, passwords, social security numbers and other personal information to individuals who intend to use them for fraudulent purposes. The scam is known as "phishing" and the communications are sent to appear to look as if they come from reputable companies
Filtering
Windows mail
Spam
Signature
A set of alphabetic or numeric characters used to authenticate a cryptographic message by ensuring that the sender cannot later disavow the message, the receiver cannot forge the message or signature, and the receiver can prove to others that the contents of the message are genuine and originated with the sender.
Subscribe to:
Posts (Atom)