ArthurSmithNetworks


 * = __Cycle 9__ ||||= __Cycle 10__ ||||= __Cycle 11__ ||||= __Cycle 12__ ||||= __Cycle 13__ ||
 * New Words || Description || New words || Description || New Words || Description || New Words || Description || New Words || Description ||
 * V.P.N || Virtual Private Network is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users access to a central organizational network. || P2P || Peer to Peer networking use P2P models. LAN model that allows every computer on a network to be both client and server. || Supercomputer || a super computer is the fastest type of computer in the world. They also have the best processing power, are very expensive and have to be highly maintained with a team of technicians and specially equipped rooms. || Linden Scripting Language (LSL) || or LSL, is the programming language used by residents of //Second Life//, a virtual world by Linden Lab || Zombie (Computers) || a **zombie** is a computer connected to the Internet that has been compromised by a cracker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction ||
 * Phishing || is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. || Spam || is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately || Host || The computer that is hosting the network, the central hub. For example in online multiplayer games the host would be the person who starts the game. || Audit Trail || is a sequence of steps supported by proof documenting the real processing of a transaction flow through an organization, a process or a system. || Computer Worms || A **computer worm** is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. ||
 * Pharming || is a hacker's attack aiming to redirect a website's traffic to another, bogus website. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software. || Spoofing || Is a process used by hackers to steal passwords and usernames online. || Mainframe || Is a type of computer that has good processing power and is pretty fast. It’s not as quick as a super computer but requires much less maintenance and aren’t as expensive. They are still too expensive for schools, small businesses etc. Relatively large businesses use these. || Botnet || is a collection of compromised computers connected to the Internet (these are also known as 'bots'). || Spamdexing || spamdexing (also known as search spam, search engine spam, web spam or Search Engine Poisoning) is the deliberate manipulation of search engine indexes ||

media type="custom" key="11588028"