• September 21, 2005 21 Sep'05

    topsite

    A topsite is a stringently protected underground FTP server at the top of the distribution chain for pirated content, such as movies, music, games, and software.  Continue Reading

  • September 21, 2005 21 Sep'05

    chaffing and winnowing

    Chaffing and winnowing are dual components of a privacy-enhancement scheme that does not require encryption.  Continue Reading

  • September 21, 2005 21 Sep'05

    goat

    In biometric verification, a goat is a system end-user who is refused access to the system because their biometric data pattern is outside the range recognized by the system.  Continue Reading

  • September 21, 2005 21 Sep'05

    cocooning

    Cocooning is the act of insulating or hiding oneself from the normal social environment, which may be perceived as distracting, unfriendly, dangerous, or otherwise unwelcome, at least for the present.  Continue Reading

  • September 21, 2005 21 Sep'05

    Elk Cloner

    Elk Cloner was the first computer virus known to have spread in the wild.  Continue Reading

  • September 21, 2005 21 Sep'05

    Quiz: Who Done IT? A Murder Mystery

    How to take the quiz: - After reading the question, click on the answer that you think is correct  Continue Reading

  • September 21, 2005 21 Sep'05

    P versus NP (polynomial versus nondeterministic polynomial)

    P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are ...  Continue Reading

  • September 21, 2005 21 Sep'05

    blended threat

    A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.    Continue Reading

  • September 21, 2005 21 Sep'05

    Chameleon Card

    The Chameleon Card is a programmable card in development at Chameleon Network that can represent each of the owner's credit, debit, and customer cards as required, making it unnecessary to carry all of the aforementioned.  Continue Reading

  • September 21, 2005 21 Sep'05

    false acceptance (type II error)

    False acceptance, also called a type II error, is a mistake occasionally made by biometric security systems.  Continue Reading

  • September 21, 2005 21 Sep'05

    false rejection (type I error)

    False rejection, also called a type I error, is a mistake occasionally made by biometric security systems.  Continue Reading

  • September 21, 2005 21 Sep'05

    fingerscanning (fingerprint scanning)

    Fingerscanning, also called fingerprint scanning, is the process of electronically obtaining and storing human fingerprints.  Continue Reading

  • September 21, 2005 21 Sep'05

    Antigen

    Sybari's Antigen is antivirus software for Lotus Domino and Microsoft Exchange.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close