Wednesday, January 5, 2011

IC3 certification exam

career or certification training by format and location.

TLS

ransport Layer Security. A layer providing encryption and authentication services that can be negotiated during the startup phase of many Internet protocols (eg SMTP, LDAP, IMAP, POP3).

strong password

is a password that is difficult to detect by humans and computer programs. A strong password consists of at least six characters including a combination of upper and lower case letters, numbers and symbols.

spyware

computer software that obtains information from a user's computer without the user's knowledge or consent

sniffer

software that monitor activities over the network (private or public).

SSI

Server Side Include; Supplemental Security Income

RST

(Running Status Table). An optional DVB SI table that contains data on the current program.

public key

public-key cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. Unlike symmetric key algorithms, it does not require a secure initial exchange of one or more secret keys to both sender and receiver.

private key

A Private Key is (1) the key of a signature key pair used to create a digital signature or (2) the key of an encryption key pair used to decrypt confidential information. In both cases, this key must be kept secret.

key logger

Keylogger is a device or program that captures activities from an input device. Malicious people can make use of keyloggers to capture personal information being input into a computer system.

hardware firewall

Eine externe (Netzwerk- oder Hardware-) Firewall (von engl. firewall [] „die Brandmauer“) stellt eine kontrollierte Verbindung zwischen zwei Netzen her. Das könnten z. B. 

hacking

 common usage, a hacker is a person who breaks into computers, usually by gaining access to administrative controls. The subculture that has evolved around hackers is often referred to as the computer underground.

brute force attack

a brute force attack is a strategy used to break the encryption of data. It involves traversing the search space of possible keys until the correct key is found.

browser hijacker

A browser hijacker is a form of malware or spyware that replaces the existing internet browser home page, error page, or search page with its own. These are generally used to force hits to a particular website.

telecommuting

employment at home while communicating with the workplace by phone or fax or modem

Tuesday, January 4, 2011

online learning

Education that occurs online via computer.

keyless entry system

A remote keyless system is a system designed to remotely permit or deny access to premises or automobiles This system was invented by mechanical engineer A.B. Makkar. There are several RKE systems on the market, including but not limited to KeeLoq by Microchip, HITAG by Philips, and AVR411 by Atmel.

e commerce

Electronic commerce, commonly known as (electronic marketing) e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. 

digital cash

Electronic money (also known as e-currency, e-money, electronic cash, electronic currency, digital money, digital cash or digital currency) refers to money or scrip which is exchanged only electronically.

critical thinking

Critical thinking involves determining the meaning and significance of what is observed or expressed, or, concerning a given inference or argument, determining whether there is adequate justification to accept the conclusion as true. 

b2g

Denotes online communication between business entities and government.

b2c

Business-to-consumer (B2C, sometimes also called Business-to-Customer) describes activities of businesses serving end consumers with products and/or services.

b2b

Business-to-business (B2B) describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer. Contrasting terms are business-to-consumer (B2C) and business-to-government (B2G).

wildcard character

The term wildcard character has the following meanings: In telecommunications, a wildcard character is a character that may be substituted for any of a defined subset of all possible characters.

wiki

A wiki ( ) is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor.

Monday, January 3, 2011

trademark

A trademark or trade mark is a distinctive sign or indicator used by an individual, business organization, or other legal entity to identify that the products or services to consumers with which the trademark appears originate from a unique source, and to distinguish its products or services

shared bookmark

use the same Annotea framework to create and maintain cooperative community indices grouping Web documents 

search engine

A search engine is an information retrieval system designed to help find information stored on a computer system. The search results are usually presented in a list and are commonly called hits.

related search

ervice can provide suggestions for more than 90% of search 

public domain

Public Domain Icon Blue Clip Arthe public domain is an intellectual property designation for the range of content that is not owned or controlled by anyone. These materials are public property, and available for anyone to use freely (the "right to copy") for any purpose. 

podcatcher

A podcatcher, or podcast client is a computer program used to download various media via an rss or xml feed.

plagiarism

 piece of writing that has been copied from someone else and is presented as being your own work

phrase searching

A search engine may provide an option to search a set of words as a phrase, either by typing in quotation marks (""), by using a command, or by clicking a button. 

p2p

P2P (Peer-To-Peer) is a way of networking computers over the internet so they can exchange files directly. P2P became more widely known through the use of filesharing systems and applications such as the original Napster and Kazaa in the late 1990s and early 2000s.

news feed

A web feed (or news feed) is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed, thereby allowing users to subscribe to it.

math symbols

his is a listing of common symbols found within all branches of mathematics. Each symbol is listed in both HTML, which depends on appropriate fonts to be installed, and in , as an image.

link list

A link exchange is a confederation of websites that operates similarly to a web ring. Webmasters register their web sites with a central organization, that runs the exchange, and in turn receive from the exchange HTML code which they insert into their web pages. 

libel

false and malicious publication printed for the purpose of defaming a living person

keyword

An index term, subject term, subject heading, or descriptor, in information retrieval, is a term that captures the essence of the topic of a document. Index terms make up a controlled vocabulary for use in bibliographic records.

indexes

index - a numerical scale used to compare variables with one another or with some reference number

secure sockets

 is a commonly-used protocol for managing the security of a message transmission on the Internet

feed

Attack of the Show! (commonly referred to as AOTS) is an American live television program shown weeknights on G4, G4 Tech TV in Canada and Fuel TV in Australia. The program is hosted by Kevin Pereira and Olivia Munn. Attack of the Show!

Sunday, January 2, 2011

directories

Directory - In computer software, specifically the command line interface of the OpenVMS operating system, the DIRECTORY command (often abbreviated as DIR) is used to list the files inside a directory. It is analogous to the DOS dir and Unix ls commands.

copyright

Copyright is the set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work. These rights can be licensed, transferred and/or assigned.

boolean

boolean is a logic system. Using the "AND" operator between terms retrieves documents containing both terms. "OR" retrieves documents containing either term. "NOT" excludes the retrieval of terms from your search. Use "NOT" with caution.

blog

ead, write, or edit a shared on-line journal

wiki

Wiki software (also known as a wiki engine or wiki application) is software that runs a wiki, or a website that allows users to collaboratively create and edit web pages using a web browser. A wiki system is usually a web application that runs on one or more web servers.

webapp

In software engineering, a web application is an application that is accessed via a web browser over a network such as the Internet or an intranet.

website

A website (also spelled Web site) is a collection of related web pages, images, videos or other digital assets that are addressed relative to a common Uniform Resource Locator (URL), often consisting of only the domain name, or the IP address, and the root path ('/') in an Internet Protocol

web cache

Web caching is the caching of web documents (e.g., HTML pages, images) to reduce bandwidth usage, server load, and perceived lag. A web cache stores copies of documents passing through it; subsequent requests may be satisfied from the cache if certain conditions are met.

Web 2.0

the term "Web 2.0" (2004-present) is commonly associated with web applications that facilitate interactive information sharing, interoperability, user-centered design, and collaboration on the World Wide Web.

URL

the address of a web page on the world wide web

social networking site

A social network service focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities.