• September 21, 2005 21 Sep'05

    P3P (Platform for Privacy Preferences)

    P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements.  Continue Reading

  • September 21, 2005 21 Sep'05

    counterfeit detector pen

    A counterfeit detector pen is a felt tip pen containing an iodine solution that can be used to help identify computer-generated counterfeit bills.  Continue Reading

  • September 21, 2005 21 Sep'05

    voiceprint

    A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual.  Continue Reading

  • September 21, 2005 21 Sep'05

    inverse mapping

    Inverse mapping is a procedure used to create associations between real or virtual objects that involves some type of reversal of another process or concept.  Continue Reading

  • September 21, 2005 21 Sep'05

    MPPE (Microsoft Point-to-Point Encryption)

    MPPE (Microsoft Point-to-Point Encryption) is a method of encrypting data transferred across Point-to-Point Protocol (PPP)-based dial-up connections or Point-to-Point Tunneling Protocol (PPTP) virtual private network (VPN) connections.  Continue Reading

  • September 21, 2005 21 Sep'05

    DomainKeys

    DomainKeys is an anti-spam software application in development at Yahoo that uses a form of public key cryptography to authenticate the sender's domain.  Continue Reading

  • September 21, 2005 21 Sep'05

    ultrasound

    Ultrasound is acoustic (sound) energy in the form of waves having a frequency above the human hearing range.  Continue Reading

  • September 21, 2005 21 Sep'05

    stealth

    In computing, stealth refers to an event, object, or file that evades methodical attempts to find it.  Continue Reading

  • September 21, 2005 21 Sep'05

    trigraph

    A trigraph is a three-character replacement for a special or nonstandard character in a text file.  Continue Reading

  • September 21, 2005 21 Sep'05

    link encryption (link level or link layer encryption)

    Link encryption (sometimes called link level or link layer encryption) is the data security process of encrypting information at the data link level as it is transmitted between two points within a network.  Continue Reading

  • September 21, 2005 21 Sep'05

    IT-ISAC (Information Technology Information Sharing and Analysis Center)

    IT-ISAC (Information Technology Information Sharing and Analysis Center) is a facility founded in January, 2001 by nineteen prominent IT industry companies (including Oracle, IBM, EDS, and Computer Sciences) to serve as a central repository for ...  Continue Reading

  • September 21, 2005 21 Sep'05

    bypass

    Bypass, in general, means either to go around something by an external route rather than going through it, or the means of accomplishing that feat.  Continue Reading

  • September 21, 2005 21 Sep'05

    voice ID (voice authentication)

    Voice ID (sometimes called voice authentication) is a type of user authentication that uses voiceprintbiometrics, voice ID relies on the fact that vocal characteristics, like fingerprints and the patterns of people's irises, are unique for each ...  Continue Reading

  • September 21, 2005 21 Sep'05

    walled garden

    On the Internet, a walled garden is an environment that controls the user's access to Web content and services.  Continue Reading

  • September 21, 2005 21 Sep'05

    Chernobyl virus

    The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed.  Continue Reading

  • September 21, 2005 21 Sep'05

    in the wild

    According to noted computer virus expert Paul Ducklin, in order for a virus to be considered in the wild, "it must be spreading as a result of normal day-to-day operations on and between the computers of unsuspecting users.  Continue Reading

  • September 21, 2005 21 Sep'05

    cryptoperiod (key lifetime or a validity period)

    A cryptoperiod (sometimes called a key lifetime or a validity period) is a specific time span during which a cryptographic key setting remains in effect.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close