Word of the Day: Mirror

#WOTD (7)

A mirror is something that you can see your reflection in. Most mirrors consist of a sheet of glass with a sheet of metal behind it. When light hits the metal, it reflects onto the glass and produces the image you see. In the computer world, however, a mirror is a Web or FTP server that has the same files on it as another server. Its purpose is to provide an alternate way to access files when the main server is so swamped with people connecting and downloading files that other people can’t get through. Unlike real-life mirrors, when you download a picture of a mirror server, the image isn’t backwards.

– definition from TechTerms

Word of the Day: Protocol

#WOTD (6)

An agreed-upon format for transmitting data between two devices. The protocol determines the following:

  • the type of error checking to be used
  • data compression method, if any
  • how the sending device will indicate that it has finished sending a message
  • how the receiving device will indicate that it has received a message

There are a variety of standard protocols from which programmers can choose. Each has particular advantages and disadvantages; for example, some are simpler than others, some are more reliable, and some are faster.

From a user’s point of view, the only interesting aspect about protocols is that your computer or device must support the right ones if you want to communicate with other computers. The protocol can be implemented either in hardware or in software.

– definition from Webopedia

Word of the Day: Rooting

#WOTD (5)

Rooting refers to the process of giving root access to subsystems of the Android mobile operating system on Android-based mobile devices like smartphones and tablets.

Specifically, rooting an Android mobile device involves adding aLinux application called “su,” which stands for SuperUser, that allows applications and commands on the device to run with elevated permissions. With the Android mobile OS utilizing the Linux kernel at its core, rooting an Android mobile device gives similar but more restricted access as on Linux operating systems.

Examples of actions a user can perform on a rooted device include running applications with administrator-level permissions, changing restricted system settings and applications, setting up wireless tethering, customizing the look of the device, and removing and replacing the device’s operating system with a newer or different mobile OS.

– definition from Webopedia

Word of the Day: Pharming

#WOTD (4)

Similar in nature to email phishing, pharming seeks to obtain personal or private (usually financial related) information through domain spoofing. Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof Web sites which appear legitimate, pharming ‘poisons’ a DNS server by infusing false information into the DNS server, resulting in a user’s request being redirected elsewhere. Your browser, however will show you are at the correct Web site, which makes pharming a bit more serious and more difficult to detect.

Phishing attempts to scam people one at a time with an e-mail while pharming allows the scammers to target large groups of people at one time through domain spoofing.

– definition for Webopedia

Word of the Day: Phishing

(fish´ing) (n.) The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

#WOTD (3)

Phishing email will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has. The website, however, is bogus and will capture and steal any information the user enters on the page.

– definition from Webopedia

Word of the Day – Virtualization

laptop-1104066_640

In computing, virtualization means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments. Even something as simple as partitioning a hard drive is considered virtualization because you take one drive and partition it to create two separate hard drives. Devices, applications and human users are able to interact with the virtual resource as if it were a real single logical resource. The term virtualization has become somewhat of a buzzword, and as a result, the term is now associated with a number of computing technologies including the following:

  • storage virtualization: the amalgamation of multiple network storage devices into what appears to be a single storage unit.
  • server virtualization: the partitioning a physical server into smaller virtual servers.
  • operating system-level virtualization: a type of server virtualization technology which works at the operating system (kernel) layer.
  • network virtualization: using network resources through a logical segmentation of a single physical network.
  • application virtualization

– definition from Webopedia

 

Page 31 of 32« First...1020...2829303132