Search: ssl

Authentication

Authentication refers to the process of identifying an individual, usually based on a username, password, and some type of additional...

Asymmetric Encryption

Asymmetric encryption, or public-key encryption, is a type of cryptographic protocol that uses a public and private key to exchange...

HTTP – HyperText Transfer Protocol

HTTP means HyperText Transfer Protocol. HTTP is the underlying protocol used by the World Wide Web. Developed by Tim Berners-Lee,...

Domain Name

Domain names are used to identify one or more IP addresses. For example, the domain name microsoft.com represents about a...

Encryption

Encryption is the process of translating data into a secret format so that only authorized parties can understand the information....

Cyber Security

Cyber security is the practice of protecting computer systems, networks, and data by using a variety of different strategies and...

Freeware

Freeware is software that is available at no charge to users. It is not a type of software, but rather...

Device

  By Vangie Beal A device is a complete piece of physical hardware that is used to compute or support...

Keyboard

A keyboard is an input device that uses a set of finger-sized buttons called keys to enter or manipulate data...

Component Software

Sometimes called componentware, software designed to work as a component of a larger application. A good analogy is the way...

Beta Test

A beta test is a type of trial period for a computer product prior to a commercial or official release....

FTP

The File Transfer Protocol (FTP) is a communication protocol providing for the transfer of files between remote devices and a...