Intellectual property rights (IPR)
Intellectual property rights (IPR), very broadly, are rights granted to creators and owners
of works that are the result of human intellectual creativity. These works can be in the industrial, scientific, literary
or artistic domains. They can be in the form of an invention, a manuscript, a suite of software, or a business name, as examples.
ISO
An ISO image is an archive file (also known as a disk image) of an optical disc in a format defined by the International Organization for Standardization (ISO). This format is supported by many software vendors. ISO image files typically have a file extension of .ISO but Mac OS X ISO images often have the extension .CDR. The name ISO is taken from the ISO 9660 file system used with CD-ROM media, but an ISO image can also contain UDF file system because UDF is backward-compatible with ISO 9660.
Malicious Code
Malicious Code is a new kind of threat which cannot be blocked by anti-virus software alone.
In contrast to viruses (which require a user to execute a program in order to cause damage), malicious code is an auto-executable
application. It can take the form of Java Applets, ActiveX controls, plug-ins, pushed content, scripting languages, or a number
of new programming languages designed to enhance Web pages and email.
Malware (virus) Detection Software
Malware, a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of
hostile, intrusive, or annoying software or program code.[1] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
Software is considered malware based on the perceived intent of the creator rather than any
particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of several U. S. states, including California and West Virginia
Patch
patch is a Unix program that updates text files according to instructions contained in a separate file, called a patch
file. The patch file (also called a patch for short) is a text file that consists of a list of differences and
is produced by running the related diff program with the original and updated file as arguments. Updating files with patch is often referred
to as applying the patch or simply patching the files.
Purge
The purge function is a handy way to clear a page's server cache. This forces the wiki software to rebuild the page completely.
Remote Access
In telecommunication, the term remote access has the following meanings:
- Pertaining to communication with a data processing facility from a remote location or facility through a data link. One of the more common methods of providing this type of remote access is using a VPN.
- Remote desktop software
- A PABX service feature that allows a user at a remote location to access by telephone PABX features, such as access to Wide Area Telephone Service (WATS) lines.
- RemoteAccess is also the name of a DOS-based BBS software.
Remote access can refer to remote desktop, remote terminal (like telnet) or any type of remote
application (including remote browser).
Social Engineering
Social engineering is the act of manipulating people into performing actions or
divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering,
fraud or computer system access; in most cases the attacker never comes face-to-face with the victim.
Spoofing
A spoofing
attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining
an illegitimate advantage.
Strong Encryption
Strong Encryption an encryption method that uses a very large number as its cryptographic
key. The larger the key, the longer it takes to unlawfully break the code. Today, 256 bits is considered strong encryption.
As computers become faster, the length of the key must be increased.
UserID
On Unix-like operating systems, users are identified within the kernel by an unsigned integer value called a user identifier, often abbreviated to UID
or User ID.
|