TechnicalJones.com

Author

Leroy Jones, Jr. is the creator of Talking Technology with Leroy Jones, Jr.

Recently in Computers Category

@TechnicalJones: Tech Term - API

| No Comments

Thumbnail image for TechTerm_Image 2008.png
APIs (Application Programming Interface)

Definition: Refers to an interface that allows for interaction between different software programs. This is much like an interface that allows interaction between humans and computers.


API_March 2011.gif


m

@TechnicalJones: Tech Term - API

| No Comments

Thumbnail image for TechTerm_Image 2008.png
APIs (Application Programming Interface)

Definition: Refers to an interface that allows for interaction between different software programs. This is much like an interface that allows interaction between humans and computers.


API_March 2011.gif


m

Tech Term - Trusted Computing Base

| No Comments

Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for TechTerm_Image 2008.png
Trusted Computing Base (TCB)

Definition:
  The totality of protection mechanisms within a computer system including hardware, firmware, and software - the combination of which are responsible for enforcing a security policy.

A TCB consists of one or more components that together enforce a unified security policy over a product or system.



TCB_Feb 2011.png


Tech Term - Trusted Computing Base

| No Comments

Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for TechTerm_Image 2008.png
Trusted Computing Base (TCB)

Definition:
  The totality of protection mechanisms within a computer system including hardware, firmware, and software - the combination of which are responsible for enforcing a security policy.

A TCB consists of one or more components that together enforce a unified security policy over a product or system.



TCB_Feb 2011.png


USB Hack

| No Comments

USB Hack

| No Comments

TECH TERM - CLOUD COMPUTING

| No Comments
TechTerm_Image 2008.pngCloud Computing

Definition
: Is a general term for anything that involves delivering hosted services over the Internet.  These services are broadly divided into three categories: Infrastructure-as-a-Service (IAAS), Platform-as-a-Service (PAAS) and Software-as-a-Service (SAAS).

The name cloud computing was inspired by the cloud symbol that's often used to represent the Internet in flowcharts and diagrams.

A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour; it is elastic -- a user can have as much or as little of a service as they want at any given time; and the service is fully managed by the provider (the consumer needs nothing but a personal computer and Internet access).

Significant innovations in virtualization and distributed computing, as well as improved access to high-speed Internet and a weak economy, have accelerated interest in cloud computing.

Cloud Computing_Nov 2010.gif

Enhanced by Zemanta

TECH TERM - CLOUD COMPUTING

| No Comments
TechTerm_Image 2008.pngCloud Computing

Definition
: Is a general term for anything that involves delivering hosted services over the Internet.  These services are broadly divided into three categories: Infrastructure-as-a-Service (IAAS), Platform-as-a-Service (PAAS) and Software-as-a-Service (SAAS).

The name cloud computing was inspired by the cloud symbol that's often used to represent the Internet in flowcharts and diagrams.

A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour; it is elastic -- a user can have as much or as little of a service as they want at any given time; and the service is fully managed by the provider (the consumer needs nothing but a personal computer and Internet access).

Significant innovations in virtualization and distributed computing, as well as improved access to high-speed Internet and a weak economy, have accelerated interest in cloud computing.

Cloud Computing_Nov 2010.gif

Enhanced by Zemanta

TECH TERMS - NAK ATTACK

| No Comments

TechTerm.pngNegative Acknowledgment
(Nak Attack)


Definition: A penetration technique which capitalizes on a potential weakness in an operating system that does not handle asynchronous interrupts properly and thus, leaves the system in an unprotected state during such interrupts.


Nak Attack_Oct 2010.jpg

TECH TERMS - NAK ATTACK

| No Comments

TechTerm.pngNegative Acknowledgment
(Nak Attack)


Definition: A penetration technique which capitalizes on a potential weakness in an operating system that does not handle asynchronous interrupts properly and thus, leaves the system in an unprotected state during such interrupts.


Nak Attack_Oct 2010.jpg

Main Index