Search Tools Links Login

Browsing Glossary

Prev   Next

Preventing Identity Theft Online
Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.
Posted:2010-05-12 , 1816 views

Why a Sitemap is Important
A sitemap is often considered redundant in the process of building a website, and that is indeed the fact if you made a sitemap for the sake of having one.
Posted:2010-05-17 , 1698 views

What Does Encryption Do For Me?
Encryption and cryptographic software has been used in many different ways to make systems more secure.
Posted:2010-05-17, 3422 views

What is a Trojan Horse?
We have all heard the term Trojan Horse, but what exactly is it?  A Trojan Horse is a destructive program that masquerades as a harmless application.
Posted:2010-05-17 , 1722 views

Wireless Broadband Basics
Wireless broadband is a general term used for the technology that is able to gain access to the internet wirelessly, and at high bandwidth speeds.
Posted:2010-05-29 , 1644 views

What is an Access Control List, or ACL ?
An access control list (ACL) is an attachment to a file, directory, or other object that provides information about permissions associated with the object.
Posted:2010-07-25 , 2071 views

What is Web Conferencing?
With web conferencing, participants can share audio, video, content or combination of these in real time.
Posted:2010-09-20, 1714 views

Prev   Next