Toggle navigation
Videos
Technology
Food & Drink
Events
How To
Snippets
Glossary
Tutorials
Home
ALL
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Wi-Fi
Wi-Fi also called WiFi is a collection of wireless network protocols,…
Network
See Computer…
Computer Network
A computer network is a set of interconnected computers that share…
Solid-state Drive (SSD)
A solid-state drive, also called SSD is a type of storage device that…
Transport Layer Security (TLS)
Transport Layer Security or TLS, is a cryptographic protocol used to…
Secure Sockets Layer (SSL)
Secure Sockets Layer, better known as SSL is an encryption Internet…
FTP Over SSL (FTPS)
The FTP over SSL, also known as FTPS, or FTP-SSL and FTP Secure is an…
Distributed Denial-of-Service (DDoS)
A Distributed Denial-of-Service, also known as DDoS attack in…
Social Engineering (Security)
Social engineering in the context of information security is the…
Uniform Resource Locator (URL)
A Uniform Resource Locator (URL) more commonly known as a web address…
World Wide Web (WWW)
The World Wide Web (WWW), commonly known as the Web is an information…
Uniform Resource Identifier (URI)
A Uniform Resource Identifier (URI) is a structured sequence of…
Browser
See web…
Web Browser
A web browser more commonly referred to as a browser is an…
Browser Helper Object (BHO)
A browser helper object or BHO is a DLL module for the Internet…
Decryption (Decrypt)
Decryption in the field of cryptography is the process of decoding…
Encryption (Encrypt)
Encryption in the field of cryptography is the process of encoding…
Cryptocurrency
Cryptovirology is the field that practices and studies how to use…
Anti-malware
See antivirus…
Antivirus Software
Antivirus software, also known as anti-malware is a computer program…
Cryptology
See…
Cryptovirology
Cryptovirology is the field that practices and studies how to use…
Cryptography
Cryptography or cryptology is the study and use of techniques for…
Metaverse
A metaverse is a network of 3D virtual worlds focused on social…
Heuristic (Computer Science)
Heuristic in mathematical optimization and computer science is a…
Algorithm
An algorithm in mathematics and computer science is a sequence of…
Extended Reality (XR)
Extended reality, also known as XR is the term that refers to all…
Mixed Reality (MR)
Mixed reality, also known as MR is an interactive environment where…
Rootkit
A rootkit is computer software, usually malicious or malware that is…
ActiveX
ActiveX is a deprecated programming framework developed by Microsoft…
Component Object Model (COM)
Component Object Model (COM) is a binary-interface standard for…
Object Linking & Embedding (OLE)
Object Linking & Embedding (OLE) is a proprietary technology…
Adware
Adware is software that is usually free for the end-user. They get…
Applet
A small application with one specific task that runs within the scope…
Avatar
An avatar is an image or icon that is used as a visual representation…
Mail Client
A mail client is a computer program that allows users to access,…
American Standard Code for Information Interchange (ASCII)
American Standard Code for Information Interchange better known as…
Application Programming Interface (API)
An Application Programming Interface or API is a set of instructions…
Motherboard
A Motherboard or mobo is the main circuit board in a computer,…
Backdoor
A backdoor in computing is a covert method of bypassing authorized…
Ransomware
Ransomware is a type of malware or malicious computer program based…
Scareware
Scareware software is a form of malware or malicious computer program…
Worm
See Computer…
Computer Worm
A computer worm is a standalone piece of malware or malicious…
Trojan Horse
A Trojan horse in computing is is a piece of malware or malicious…
Virus
See Computer…
Computer Virus
A computer virus is a type of malicious computer program or malware…
Malware
Malware is malicious software that is intentionally designed to cause…
1
«
Previous page
3
4
5
6
7
»
Next page
Scheduled Events
There are no upcoming events.
Recent Topics
Our Pick for 20 Best WordPress Plugins in 2024 so Far
Exploring the 11 Best JavaScript Animation Libraries in 2024 so Far
What is a Corporate Intranet and its Relevance Today
Key Differences Between an Intranet vs Extranet vs Internet
Follow These Steps to Check if Your Phone Activity is Being Forwarded
How to Force Curl to Use Outgoing IPv4 or IPv6 Addresses
JavaScript vs CSS Animation: What’s the Difference?
Do This to Install MariaDB 11.5.1 on Rocky Linux 8.10 Systems
How to Install Linux, Apache, MySQL, PHP (LAMP) on Rocky Linux 8.10 Systems
How to Install Python 3.12 on AlmaLinux 8.10 Systems
x