• September 21, 2005 21 Sep'05

    MPPE (Microsoft Point-to-Point Encryption)

    MPPE (Microsoft Point-to-Point Encryption) is a method of encrypting data transferred across Point-to-Point Protocol (PPP)-based dial-up connections or Point-to-Point Tunneling Protocol (PPTP) virtual private network (VPN) connections.  Continue Reading

  • September 21, 2005 21 Sep'05

    DomainKeys

    DomainKeys is an anti-spam software application in development at Yahoo that uses a form of public key cryptography to authenticate the sender's domain.  Continue Reading

  • September 21, 2005 21 Sep'05

    ultrasound

    Ultrasound is acoustic (sound) energy in the form of waves having a frequency above the human hearing range.  Continue Reading

  • September 21, 2005 21 Sep'05

    stealth

    In computing, stealth refers to an event, object, or file that evades methodical attempts to find it.  Continue Reading

  • September 21, 2005 21 Sep'05

    trigraph

    A trigraph is a three-character replacement for a special or nonstandard character in a text file.  Continue Reading

  • September 21, 2005 21 Sep'05

    link encryption (link level or link layer encryption)

    Link encryption (sometimes called link level or link layer encryption) is the data security process of encrypting information at the data link level as it is transmitted between two points within a network.  Continue Reading

  • September 21, 2005 21 Sep'05

    IT-ISAC (Information Technology Information Sharing and Analysis Center)

    IT-ISAC (Information Technology Information Sharing and Analysis Center) is a facility founded in January, 2001 by nineteen prominent IT industry companies (including Oracle, IBM, EDS, and Computer Sciences) to serve as a central repository for ...  Continue Reading

  • September 21, 2005 21 Sep'05

    bypass

    Bypass, in general, means either to go around something by an external route rather than going through it, or the means of accomplishing that feat.  Continue Reading

  • September 21, 2005 21 Sep'05

    voice ID (voice authentication)

    Voice ID (sometimes called voice authentication) is a type of user authentication that uses voiceprintbiometrics, voice ID relies on the fact that vocal characteristics, like fingerprints and the patterns of people's irises, are unique for each ...  Continue Reading

  • September 21, 2005 21 Sep'05

    walled garden

    On the Internet, a walled garden is an environment that controls the user's access to Web content and services.  Continue Reading

  • September 21, 2005 21 Sep'05

    Chernobyl virus

    The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed.  Continue Reading

  • September 21, 2005 21 Sep'05

    in the wild

    According to noted computer virus expert Paul Ducklin, in order for a virus to be considered in the wild, "it must be spreading as a result of normal day-to-day operations on and between the computers of unsuspecting users.  Continue Reading

  • September 21, 2005 21 Sep'05

    cryptoperiod (key lifetime or a validity period)

    A cryptoperiod (sometimes called a key lifetime or a validity period) is a specific time span during which a cryptographic key setting remains in effect.  Continue Reading

  • September 21, 2005 21 Sep'05

    output feedback (OFB)

    In cryptography, output feedback (OFB) is a mode of operation for a block cipher.  Continue Reading

  • September 21, 2005 21 Sep'05

    ciphertext feedback (CFB)

    Ciphertext feedback (CFB) is a mode of operation for a block cipher. In contrast to the cipher block chaining (CBC) mode, which encrypts a set number of bits of plaintext at a time, it is at times desirable to encrypt and transfer some plaintext ...  Continue Reading

  • September 21, 2005 21 Sep'05

    MD2

    MD2 is an earlier, 8-bit version of MD5, an algorithm used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any length) that is claimed to be as unique to that specific data as a ...  Continue Reading

  • September 21, 2005 21 Sep'05

    MD4

    MD4 is an earlier version of MD5, an algorithm used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any length) that is claimed to be as unique to that specific data as a ...  Continue Reading

  • September 21, 2005 21 Sep'05

    decipher

    All three terms - decipher, decrypt, and decode - mean to convert ciphertext into the original, unencrypted plaintext.  Continue Reading

  • September 21, 2005 21 Sep'05

    server accelerator card (SSL card)

    A server accelerator card (also known as an SSL card) is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites.  Continue Reading

  • September 21, 2005 21 Sep'05

    Electronic Code Book (ECB)

    Electronic Code Book (ECB) is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close