-NET Frameworks
The Microsoft .NET Framework is a software framework that is available with several Microsoft Windows operating systems. It
includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the
execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended
to be used by most new applications created for the Windows platform.
retrieved from: http://en.wikipedia.org/wiki/.NET_Framework
March 11, 2009
- ASP - Active Server Pages
Active Server Pages (ASP), also known as Classic ASP, was Microsoft's first server-side script engine for dynamically-generated
web pages. Initially released as an add-on to Internet Information Services (IIS) via the Windows NT 4.0 Option Pack, it was
subsequently included as Read Allows users or groups to see the object.a free component of Windows Server
retrieved from:
http://en.wikipedia.org/wiki/Active_Server_Pages, March 11, 2009
- Access
Access (telecommunications), the process of signing onto a network
reetrieved from:
http://en.wikipedia.org/wiki/Access, march 11, 2009
Microsoft Office Access, previously known as Microsoft Access, is a relational database management system from Microsoft that
combines the relational Microsoft Jet Database Engine with a graphical user interface and software development tools. It is
a member of the Microsoft Office suite of applications and is included in the Professional and higher versions for Windows
and also sold separately. There is no version for MacOS or for Microsoft Office Mobile.
Microsoft Access is known for its ability to empower non-professional developers to create database applications on their
own. Users can easily create tables, queries, forms and reports, and connect them together with macros. Advanced users can
use VBA to write rich solutions with advanced data manipulation and user control.
retrieved from:http://en.wikipedia.org/wiki/Microsoft_Access, March 11, 2009
- Access Privileges
About Access Privileges
Access privileges determine which portal objects a user can browse or edit, which objects appear in search results, and which
can be added to My Pages and community pages.
Read Allows users or groups to see the object.
Select Allows users or groups to add the object to other objects.
Edit Allows users or groups to modify the object.
Admin Allows users or groups full administrative control of the object, including deleting the object or approving it for
migration.
- Active Hyperlink
A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking
on the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.
retrieved from:
http://www.webopedia.com/TERM/A/active_hyperlink.html, March 11, 2009
- Administrator (as an IT resource)
Information technology (IT) administrators manage the day-to-day operations of IT systems to make sure that they run effectively.
IT administrators work with IT managers to make sure that the computer system provides sufficient computing power to deliver
the desired level of business performance.
IT administrators may perform the following tasks:
* talk with managerial, administrative and technical staff to determine information needs, data flows and systems definitions
* establish and control systems access and security
* coordinate protocols for operation within multi-user IT networks that provide voice, data and text transmission
* check systems in order to optimise performance and to initiate recovery action after system failures
* implement regular housekeeping procedures, including data backup
* manage the distribution and retention of data on various storage devices
* coordinate system updates and replacement of 'old' versions
* maintain data dictionaries
* provide day-to-day advice to users on data structures and terminology
* provide assistance in testing new equipment and systems
* prepare technical reports on the operation of systems
* prepare systems cost estimates and cost-benefit analyses
* coordinate the work of support staff
* provide training in systems use and access.
retrieved from: http://www.jobguide.thegoodguides.com.au/occupation/view/223111A, March 11, 2009
- Authentication
Authentication (from Greek: αυθεντικός; real or genuine, from authentes;
author) is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about
the subject are true. This might involve confirming the identity of a person, the origins of an artifact, or assuring that
a computer program is a trusted one.
retrieved from: http://en.wikipedia.org/wiki/Authentication
March 11, 2009
- Data Administrator
A person who coordinates activities within the data administration department. Same as "database analyst."
retrieved from: http://www.pcmag.com/encyclopedia_term/0,2542,t=data+administrator&i=40736,00.asp
March 11, 2009
- Electronic Commerce
Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services
over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has
grown extraordinarily since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and
drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing,
electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic
commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass
a wider range of technologies such as e-mail as well.
retrieved from: http://en.wikipedia.org/wiki/E-commerce
March 11, 2009
- Electronic Government (eGovernment)
e-Government (short for electronic government, also known as e-gov, digital government, online government or transformational
government) is a diffused neologism used to refer to the use of information and communication technology to provide and improve
government services, transactions and interactions with citizens, businesses, and other arms of government.
Contents.
retrieved from: http://en.wikipedia.org/wiki/E-Government
March 11, 2009
- Encryption
In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called
cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
retrieved from: http://en.wikipedia.org/wiki/Encryption March 11, 2009
Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people.
Decryption is the process of converting encrypted data back into its original form, so it can be understood.
retrieved from: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212062,00.html march 11, 2009
- Information Technology
Information technology is the use of computers and software to manage information. In some companies, this is referred to
as Management Information Services (or MIS) or simply as Information Services (or IS).
retrieved from:
http://jobsearchtech.about.com/od/careersintechnology/p/ITDefinition.htm march 11, 2009
Information technology (IT), as defined by the Information Technology Association of America (ITAA), is "the study, design,
development, implementation, support or management of computer-based information systems, particularly software applications
and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect,
process, transmit, and securely retrieve information.
retrieved from: http://en.wikipedia.org/wiki/Information_technology march 11, 2009
- Information Technology Resource (IT Resource)
ITR (Information Technology Resources) is a Veteran owned Technical consulting and recruiting firm focused on the Information
Technology Industry. ITR is headquartered in Knoxville Tennessee serving both small and large clients across the country.
retrieved from: http://www.ittechies.com/ March 11, 2009
- Intellectual property rights (IPR)
Intellectual property (IP) are legal property rights over creations of the mind, both artistic and commercial, and the corresponding
fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets,
such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs.
Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.
retrieved from: http://en.wikipedia.org/wiki/Intellectual_property March 11, 2009
- ISO
ISO (International Organization for Standardization) is the world's largest developer and publisher of International Standards.
ISO is a network of the national standards institutes of 159 countries, one member per country, with a Central Secretariat
in Geneva, Switzerland, that coordinates the system.
ISO is a non-governmental organization that forms a bridge between the public and private sectors. On the one hand, many of
its member institutes are part of the governmental structure of their countries, or are mandated by their government. On the
other hand, other members have their roots uniquely in the private sector, having been set up by national partnerships of
industry associations.
retrieved from: http://www.iso.org/iso/about.htm March 11, 2009
- Malicious Code
Malicious code (also called vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional
antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause damage, vandals
are auto-executable applications.
retrieved from:
http://www.aladdin.com/csrt/malicious-code.aspx March 11, 2009
Types of Malicious Code
* Access Violations - The most dangerous malicious code is that which tries to access (delete, steal, alter, or execute) unauthorized
files. The attacks can steal passwords, files, or other confidential data. Some examples of company information that could
be exposed or include login names and passwords, secret project information, IPO plans, credit card numbers, confidential
phone numbers, social security numbers, addresses, and more. Code can also delete, encrypt, or modify files on disk. Real-life
examples of these attacks are described later in this paper. Access violation attacks require behavior monitoring and can't
be effectively blocked by ‘code scanning' methods.
* Denial of Service Attacks - Denial of Service attacks prevent the user from using the system, and may destroy files that
are open at the time of the attack. They work by performing repetitive tasks like opening an infinite number of windows until
the system locks up. These types of attacks can be stopped through inspection of all incoming content.
retrieved from: http://www.aladdin.com/csrt/malicious-code.aspx March 11, 2009
- Malware (virus) Detection Software
Malware (for "malicious software") is any program or file that is harmful to a computer user. Thus, malware includes computer
viruses, worms, Trojan horses, and also spyware, programming that gathers information about a computer user without permission.
retrieved from:
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci762187,00.html March 11, 2009
Malware, a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system
without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of
forms of hostile, intrusive, or annoying software or program code.[1] The term "computer virus" is sometimes used as a catch-all
phrase to include all types of malware, including true viruses.
retrieved from: http://en.wikipedia.org/wiki/Malware March 11, 2009
- Patch
Patch is a Unix program that updates text files according to instructions contained in a separate file, called a patch file.
The patch file (also called a patch for short) is a text file that consists of a list of differences and is produced by running
the related diff program with the original and updated file as arguments. Updating files with patch is often referred to as
applying the patch or simply patching the files.
retrieved from: http://en.wikipedia.org/wiki/Patch_(Unix) March 11, 2009
A patch is a small piece of software designed to fix problems with or update a computer program or its supporting data. This
includes fixing bugs, replacing graphics and improving the usability or performance. Though meant to fix problems, poorly
designed patches can sometimes introduce new problems.
retrieved from:http://en.wikipedia.org/wiki/Patch_(computing) March 11, 2009
- Personal IT Resources
- Purge
In history and political science, a purge is the removal of people who are considered undesirable by those in power from a
government, from another organisation, or from society as a whole. Purges can be peaceful or violent; many will end with the
imprisonment or exile of those purged, but in some cases they will simply be removed from office. Restoring people who have
been purged is known as rehabilitation.
retrieved from: http://en.wikipedia.org/wiki/Purge March 11, 2009
To systematically and permanently remove old and unneeded data. The term purge is stronger than delete. It is often possible
to regain deleted objects by undeleting them, but purged objects are gone forever.
retrieved from: http://www.webopedia.com/TERM/P/purge.html March 11, 2009
- Remote Access
In telecommunication, the term remote access has the following meanings:
1. Pertaining to communication with a data processing facility from a remote location or facility through a data link. One
of the more common methods of providing this type of remote access is using a VPN.
1. Remote desktop software
2. A PABX service feature that allows a user at a remote location to access by telephone PABX features, such as access to
Wide Area Telephone Service (WATS) lines.
3. RemoteAccess is also the name of a DOS-based BBS software.
Remote access can refer to remote desktop, remote terminal (like telnet) or any type of remote application.
retrieved from: http://en.wikipedia.org/wiki/Remote_access
March 11, 2009
Remote access is the ability to get access to a computer or a network from a remote distance. In corporations, people at branch
offices, telecommuters, and people who are travelling may need access to the corporation's network. Home users get access
to the Internet through remote access to an Internet service provider (ISP). Dial-up connection through desktop, notebook,
or handheld computer modem over regular telephone lines is a common method of remote access. Remote access is also possible
using a dedicated line between a computer or a remote local area network and the "central" or main corporate local area network.
A dedicated line is more expensive and less flexible but offers faster data rates. Integrated Services Digital Network (ISDN)
is a common method of remote access from branch offices since it combines dial-up with faster data rates. wireless, cable
modem, and Digital Subscriber Line (DSL) technologies offer other possibilities for remote access.
A remote access server is the computer and associated software that is set up to handle users seeking access to network remotely.
Sometimes called a communication server, a remote access server usually includes or is associated with a firewall server to
ensure security and a router that can forward the remote access request to another part of the corporate network. A remote
access server may include or work with a modem pool manager so that a small group of modems can be shared among a large number
of intermittently present remote access users.
A remote access server may also be used as part of a virtual private network (VPN).
retrieved from: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212887,00.html
March 11, 2009
- Social Engineering
In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on
human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what
used to be called a "con game". For example, a person using social engineering to break into a computer network would try
to gain the confidence of someone who is authorized to access the network in order to get them to reveal information that
compromises the network's security. They might call the authorized employee with some kind of urgent problem; social engineers
often rely on the natural helpfulness of people as well as on their weaknesses. Appeal to vanity, appeal to authority, and
old-fashioned eavesdropping are typical social engineering techniques.
Another aspect of social engineering relies on people's inability to keep up with a culture that relies heavily on information
technology. Social engineers rely on the fact that people are not aware of the value of the information they possess and are
careless about protecting it. Frequently, social engineers will search dumpsters for valuable information, memorize access
codes by looking over someone's shoulder (shoulder surfing), or take advantage of people's natural inclination to choose passwords
that are meaningful to them but can be easily guessed. Security experts propose that as our culture becomes more dependent
on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people
about the value of information, training them to protect it, and increasing people's awareness of how social engineers operate.
retrieved from: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci531120,00.html
March 11, 2009
- Spoofing
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere
other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly
even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise
the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who
fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.
E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not
include an authentication mechanism. Although an SMTP service extension (specified in IETF RFC 2554) allows an SMTP client
to negotiate a security level with a mail server, this precaution is not often taken. If the precaution is not taken, anyone
with the requisite knowledge can connect to the server and use it to send messages. To send spoofed e-mail, senders insert
commands in headers that will alter message information. It is possible to send a message that appears to be from anyone,
anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you
with a message that you didn't write.
Although most spoofed e-mail falls into the "nuisance" category and requires little action other than deletion, the more malicious
varieties can cause serious problems and security risks. For example, spoofed e-mail may purport to be from someone in a position
of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information -- any of which
can be used for a variety of criminal purposes. The Bank of America, eBay, and Wells Fargo are among the companies recently
spoofed in mass spam mailings. One type of e-mail spoofing, self-sending spam, involves messages that appear to be both to
and from the recipient.
retrieved from: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci840262,00.html
March 11, 2009
Spoofing is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order
to forward packets through the Internet, but ignore the "source IP" address. That address is only used by the destination
machine when it responds back to the source.
A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line,
sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected,
meaning you cannot create a normal network connection.
However, IP spoofing is an integral part of many network attacks that do not need to see responses (blind spoofing).
retrieved from: http://www.iss.net/security_center/advice/Underground/Hacking/Methods/Technical/Spoofing/default.htm
March 11, 2009
- Strong Encryption
Strong Encryption Package™ is an add on for Private Encryptor Encryptor, adding seven additional types of encryption.
retrieved from: http://www.tropsoft.com/strongenc/prodinfo.htm March 11, 2009
- UserID
On Unix-like operating systems, users are identified within the kernel by an unsigned integer value called a user identifier,
often abbreviated to UID or User ID. The range of its values varies amongst different systems; at the very least, a UID is
a 15-bit integer, ranging between 0 and 32767, with the following restrictions:
* The superuser must always have a UID of zero (0).
* The user "nobody" was traditionally assigned the largest possible UID (as the opposite of the Superuser), 32767. More recently,
the user is assigned a UID in the system range (1–100, see below) or between 65530–65535.
* UIDs from 1 to 100 are otherwise reserved for system use by convention; some manuals recommend that UIDs from 101 to 499
(RedHat) or even 999 (Debian) be reserved as well.
The UID value references users in the /etc/passwd file. Shadow password files and Network Information Service also refer to
numeric UIDs. The user identifier is a necessary component of Unix file systems and processes. Some operating systems might
have support for 16-bit UIDs, making 65536 unique IDs possible, though a modern system with 32-bit UIDs will potentially make
4,294,967,296 (232) distinct values available.
retrieved from:http://en.wikipedia.org/wiki/User_identifier_(Unix) March 11, 2009
In computing, a user is a person who uses a computer or Internet service. A user may have a user account that identifies the
user by a username (also user name), screenname (also screen name), or "handle", which is derived from the identical Citizen's
Band radio term. To log in to an account, a user is typically required to authenticate himself with a password or other credentials
for the purposes of accounting, security, logging, and resource management.
Users are also widely characterized as the class of people that use a system without complete technical expertise required
to fully understand the system. In most hacker-related contexts, they are also divided into lusers and power users. Both are
terms of opprobriation, but the latter connotes a "know-it-all" attitude.
retrieved from: http://en.wikipedia.org/wiki/User_(computing) March 11, 2009
|