Social Icons

Saturday, August 17, 2019

Computer glossary of terms beginning with the letter A

Definition of computer terms beginning with the letter A 

ActiveX

Microsoft's technology to install programs over the Internet that add additional features to your browser (the program you are surfing the Internet with). This technique is sometimes hijacked by spyware writers.

Ad hoc

"Ad Hoc" mode is a mode of operation that allows computers connected directly to a Wi-Fi network card to be connected directly, without the use of third-party hardware such as an Access Point (AP).
.

Address Spoofing

Malicious act of deliberately using the address of another system instead of his own.

Adware

Form of spyware. An adware is a software that displays on your computer all kinds of advertisements, usually in the form of a pop-up, that is to say a small window opening unexpectedly and containing an advertisement. This advertisement should not be confused with advertising that you see often when you visit a website.

AIS

Automated information system. This term refers to all equipment (hardware, software, or "firmware") that enables the automatic acquisition, storage, manipulation, control, display, transmission, or reception of data.

Alert

Message describing a circumstance relating to network security. Alerts often come from active monitoring systems on the network.

Algorithm

A procedure, formula, or list of instructions that can be used to complete a task or solve a problem. In mathematics and computer science, an algorithm usually represents a procedure used to solve a recurring problem.

Cryptographic algorithm

A method used to transform plain text into an unreadable and unintelligible form. A cryptogram is text that has been encoded in this unreadable format. This method often involves the use of a mathematical formula to encrypt the plaintext in cryptogram and a key to decrypt the cryptogram.

Ankle-Biter

An individual who wants to become a Cracker or Hacker whose knowledge of computer systems is insufficient. In general, most of the time they are young teens using easy-to-use programs from the Internet.

Anti-Rootkit

Security software for detecting and disabling or removing rootkits.

Anti-Spyware

Computer program that protects your computer against spyware.

Anti-virus

Computer program that protects your computer against viruses.

AntiSpam

Antispam system where someone who sends an e-mail for the first time to the user of this system must first demonstrate that he is not a spammer, via a simple operation. Only then can he send a message to the user of the challenge response system.

ARP

The Address Resolution Protocol is a protocol that translates a network layer protocol address (typically an IP address) into an Ethernet address (typically a MAC address), or even any hardware. link layer.

ASIM

System for automatically evaluating a security incident, monitoring network traffic and collecting information about network elements where unauthorized activity is detected.

ASM

Automatic management of security. Term for all security services that provide an effective level of protection for the physical environment, the software environment, and any kind of data.
Assessment
Vulnerability analysis of an automated information system that consists of monitoring and inspecting the system. Its purpose is to help the administrator to secure it as much as possible.

ATM

Asynchronous transfer mode. A method of dynamically distributing bandwidth using fixed-size packets called cells. The term "fast packet switching" is also used to refer to ATM technology. (Asynchronous Transfer Mode)

Authentication Header

Header identification. When exchanging data between two computers, this is the field that follows the IP header in an IP datagram and verifies the source and its integrity.

Authentication

The purpose of authentication is to verify the identity that an entity claims.



my-courses.net

No comments:

Post a Comment

Category Of Mobile Courses

Actualités (644) Adsense (1) Affiliation (1) Algebraic Topology (1) Algorithmic (1) all-news (30) Android (5) Android App (8) Android app without code (4) Android Apps (167) Android Development (4) Android download (2) Android OS (3) AngularJS (1) Automata theory and formal language (5) C programming (5) Category and Functor (8) CMS (3) Computer Glossary (18) Create Mobile App With Ionic Framework (2) CSS (2) CSS-Cascading-Style-Sheets (4) Developpement Java (13) Differential Geometry (1) Django-Python-Framework (8) dropshiping (26) Earn Money by Internet (4) Emplois (23) Framework php (2) Fraud (2) HTML (7) Java For Beginners (10) Javascript (12) Kotlin Programming Language (8) Kotlin For Mobile Android (1) Linux Download (2) Marketing (5) Mobile (3) Mobile Courses (4) Mobile Marketing (4) MoneyGram (1) News (721) Node.js (5) Open Source (1) Photoshop (1) Protect Computer (1) Python (32) Python BeautifulSoup (1) Python For Data Science (2) Python-Books (6) Python-DVD-Training (1) Python-Exercises (138) Python-Framework (1) Python-IDE (1) Python-Modules (1) Python-pdf (2) Python-pyQt (1) Référencement (2) Script PHP (2) Security (6) SEO (1) Snipping Tool: Faq (1) Social Networks (1) Source Code (1) Statistics With SPSS (2) Surveillance Software (1) Travail à domicile (6) Tutoriels php en vidéos (2) Tutoriels-MySql (6) tutoriels-php (19) Utilitaires (1) VPS (1) Web Hosting (1) Webcam (1) Webmarketing (11) Western Union (1) Windows 10 (1) Windows 7 (4) Windows 7 Faq (2) Windows 8 (1) Windows Accessories (1) Windows Download (8) Windows Drivers (1) Windows Fonts (1) Windows Power Shell (2) Windows Registry (2) Windows Security (18) Windows Software (2) Windows Spyware (2) Windows utilities (3) Windows Virus (2) Windows Vista (3) Windows Wireless (1) Windows xp (1) Wordpress (1)
 

Sample text

Sample Text

 
Blogger Templates