File Transfer Protocol (FTP) - Transfers large files between computers or servers., FileZilla, Cyberduck, WinSCP - Examples of FTP services, Grid Computing - A distributed system where multiple computers work together on a shared task., Cloud Computing - Provides on-demand computing resources over the Internet., Streaming - A technology that allows users to access and play audio, video, or other media in real time over the internet without downloading the entire file., ADSL - Uses telephone lines to transmit data., Fiber Optic - Uses light signals transmitted through glass or plastic fibres., ISP (Internet Service Provider) - A company that provides the infrastructure for connecting to the internet, Broadband - High-speed, always-on internet access., Bandwidth - The amount of data that can be transmitted over a network in a given time., Throttling - The intentional slowing down or limiting of data transfer speeds by an ISP, usually done to manage network congestion or to enforce fair usage policies., Shaping/Traffic shaping - The process of controlling the flow of data packets into the network to optimize or guarantee performance., Fair Use Policy (FUP) - A set of guidelines or rules imposed by Internet Service Providers (ISPs) to manage and control how users consume data on their networks., Distributed Denial-of-Service (DDoS) Attack - It involves overwhelming a network, server, or website with a flood of internet traffic, making it unavailable to users., Botnet/Zombies - A network of computers infected with malware that allows cybercriminals to control them remotely., Malware - Software designed to damage, disrupt, or gain unauthorized access to a system. E.g. viruses, worms, and trojans., Spyware - A type of malicious software that secretly monitors and collects user data, often for malicious purposes like identity theft., Adware - Software that automatically displays or downloads advertising material, often in the form of pop-ups., Keylogging - A type of software that records the keystrokes of a user, often for stealing sensitive information like usernames, passwords, or credit card details., Clickjacking - A malicious technique where an attacker tricks a user into clicking on something different from what they intended, often leading to unintended actions., Ransomware - A type of malware that locks or encrypts files on a victim's system and demands payment (ransom) to restore access to the files., Firewall - A security system that monitors and controls incoming and outgoing network traffic based on specific security rules., Virtual Private Network (VPN) - A technology that creates a secure, encrypted connection between your device and the internet, Two-Factor Authentication (2FA) - A security process that requires two forms of identification before granting access to an account or system (e.g., a password + a one-time code sent via text or an authentication app)., Antivirus software - Software that protects your device from malicious programs like viruses, worms, and trojans.,

Network and internet technologies

Leaderboard

Visual style

Options

Switch template

Continue editing: ?