Technology

Sun
28
Aug
Dennis Faas's picture

Superuser

On many computer operating systems, " SuperUser " is the term used for the special user account that is controlled by the system administrator. SuperUser: Unix and Unix-like In Unix-style computer operating systems, root is the conventional name of ... the user who has all rights or permissions in all modes (single- or multi-user). The user root can do many things an ordinary user cannot, such as changing the ownership of files and binding to ports numbered below 1024. Generally, it is not good practice for anyone to use root as their normal user account, because simple typographical ... (view more)

Sat
27
Aug
Dennis Faas's picture

Cd Key

A CD key, or product key is a specific software-based key for a certain computer program and is used to identify that the copy of the program is original. For official products the key might be used offline, at other times with software like ... Windows, it is registered online to prevent multiple people using the same key. The term CD key likely comes from the fact that the key is usually on the case or the CD. Computer games and Window Install discs come with CD keys to verify that the disc has been not been illegally copied. The key itself consist of a series of numbers and/or letters. This ... (view more)

Fri
26
Aug
Dennis Faas's picture

Phishing

In computing, phishing (also known as carding and spoofing) is the act of attempting to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business with a real need for ... such information in a seemingly official electronic notification or message, such as an email or an instant message. It is a form of a social engineering attack. The term phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' financial information and password data. With the growing ... (view more)

Thu
25
Aug
Dennis Faas's picture

Cd Recorder

A CD / DVD recorder is a compact disc drive that can be used to produce discs readable in other CD / DVD-ROM drives. A DVD recorder similarly produces DVD discs playable in stand-alone video players or DVD-ROM drives. They are generally used for ... small-scale archival or data exchange, being slower and more materially expensive than the moulding process used to mass-manufacture pressed discs. The recorder encodes (or burns) data onto a recordable CD-R, DVD-R or DVD+R disc (called a blank) by selectively heating parts of an organic dye layer in the disc with a laser in its write head. This ... (view more)

Tue
23
Aug
Dennis Faas's picture

Mpeg

The Moving Picture Experts Group ( MPEG ) is a working group of ISO/IEC charged with the development of video and audio encoding standards. Since its first meeting in 1988, MPEG has grown to include approximately 350 members from various industries ... and universities. MPEG's official designation is ISO/IEC JTC1/SC29 WG11. MPEG (pronounced EM-peg) has standardized the following compression formats and ancillary standards: MPEG-1: Initial video and audio compression standard. Later used as the standard for Video CD, and includes the popular Layer 3 (MP3) audio compression format. MPEG-2: ... (view more)

Mon
22
Aug
Dennis Faas's picture

Malware

Malware Malware , or "malicious software" is a generic term used to describe various types of malevolent programs. Below are some of the most common forms of malware. Virus Viruses have used many sorts of hosts. When computer viruses first ... originated, common targets were executable files that are part of application programs and the boot sectors of floppy disks. More recently, most viruses have embedded themselves in e-mail as Email attachments, depending on a curious user opening the viral attachment. In the case of executable files, the infection routine of the virus arranges that ... (view more)

Sat
20
Aug
Dennis Faas's picture

Service Pack

A Service Pack (more commonly known as "SP") is a software program that corrects known bugs, problems, or adds new features (and/or both). Companies that produce large applications such as Microsoft and their Windows NT-based operating systems ... typically release a service pack when the number of individual patches to the application becomes too large. Service Packs are easier to install than groups of patches, especially with multiple computers that need to be updated over a network. Windows NT 4.0 currently has 6 Service Packs. Windows 2000 currently has 4 Service Packs. Windows XP ... (view more)

Thu
18
Aug
Dennis Faas's picture

Web Radio

Internet radio is a broadcasting service transmitted via the Internet. Not every internet "radio station" has a corresponding traditional radio station. Many internet radio stations are completely independent from traditional ("terrestrial") radio ... stations and broadcast only on the Internet. Broadcasting on the Internet is usually referred to as streaming. Because the radio signal is relayed over the Internet, it is possible to access the stations from anywhere in the world -- for example, to listen to an Australian radio station from Europe or America. This makes it a popular service for ... (view more)

Tue
16
Aug
Dennis Faas's picture

Sound Card

A sound card is a computer expansion card that can input and output sound under program control. Most personal computers today have sound cards built onto the main board and do not require a secondary / separate sound card. Sound Cards: General ... Characteristics A typical sound card includes a sound chip usually featuring a digital-to-analog converter that converts recorded or generated digital waveforms of sound into an analog format. This signal is led to a (earphone-type) connector where a cable to an amplifier or similar sound destination can be plugged in. More advanced designs usually ... (view more)

Thu
11
Aug
Dennis Faas's picture

Spyware

Spyware is a broad category of malicious software intended to intercept or take partial control of a computer's operation without the user's informed consent. While the term taken literally suggests software that surreptitiously monitors the user, ... it has come to refer more broadly to software that subverts the computer's operation for the benefit of a third party. Spyware differs from viruses and worms in that it does not usually self-replicate. Like many recent viruses, spyware is designed to exploit infected computers for commercial gain. Typical tactics furthering this goal include ... (view more)

Pages

Subscribe to RSS - Technology