• June 05, 2007 05 Jun'07

    Life at the edge: Securing the network perimeter

    Learn strategies for securing the network perimeter to resist attacks.  Continue Reading

  • June 04, 2007 04 Jun'07

    van Eck phreaking

    Van Eck phreaking is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring and picking up the electromagnetic fields (EM fields) that are produced by the ...  Continue Reading

  • June 04, 2007 04 Jun'07

    TACACS (Terminal Access Controller Access Control System)

    TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can ...  Continue Reading

  • June 04, 2007 04 Jun'07

    spoof

    Spoof was a game involving trickery and nonsense that was invented by an English comedian, Arthur Roberts, prior to 1884, when it is recorded as having been "revived.  Continue Reading

  • June 04, 2007 04 Jun'07

    spam trap

    A spam trap is the inclusion of an option in an online form that is preselected by default with the expectation that the user will fail to notice the option.  Continue Reading

  • June 04, 2007 04 Jun'07

    user profile

    In a Windows environment, a user profile is a record of user-specific data that define the user's working environment.  Continue Reading

  • June 04, 2007 04 Jun'07

    salt

    In password protection, salt is a random string of data used to modify a password hash.  Continue Reading

  • June 04, 2007 04 Jun'07

    public key certificate

    A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.  Continue Reading

  • June 04, 2007 04 Jun'07

    shadow password file

    In the Linux operating system, a shadow password file is a system file in which encryption user password are stored so that they aren't available to people who try to break into the system.  Continue Reading

  • June 04, 2007 04 Jun'07

    RADIUS (Remote Authentication Dial-In User Service)

    Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or ...  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close