ip address - A string of characters that identifies each computer using the Internet Protocol., ban - An official or legal prohibition, malware - Software intentionally designed to cause damages, trojan - Malware which misleads users of their true intent., backdoor - A means to access a computer system or encrypted data, phishing - The fraudulent attempt to obtain sensitive information or data by impersonating oneself as a trustworthy entity., account - The set of identification data of a user, which allow him to access a telematic service., server - A piece of computer hardware or software that provides functionality for other programs or devices, called "clients"., firewall - A security system that monitors incoming and outgoing network traffic based on predetermined security rules., netiquette - Short for "Internet etiquette", it's a code of polite behavior on the internet., VOD - An interactive television service, that allows users to use an entertainment product with internet connection., post - Message (photo or video) sent to a blog or in a discussion group on the Internet., shop online - Kind of electronic shop where the purchase and the economic transaction is entirely in the website., Two-step verification - A process that involves two authentication methods performed one after the other to verify the identity of the user., voip - The set of rules that makes it possible to use the internet for telephone or videophone communication, bug - Failure of a system or program., crash - Blocking of the functioning of an electronic processing system., lag - A slow response from a computer., subnet mask - It separates the IP address into the network and host addresses., VPN - An arrangement whereby a secure, apparently private network is achieved using encryption over a public network.,

Classifica

Tema

Opzioni

Cambia modello

Ripristinare il titolo salvato automaticamente: ?