Tags » IT Security

Tech Terms: Token

Besides those small shiny coins that allow you to play video games, there are three different types of tokens:

1. In networking, a token is a series of bits that circulate on a token-ring network. 164 more words

ZEROFAIL Southeast

Tech Terms: Trinitron

Trinitron is arguably the best consumer CRT (Cathode Ray Tube) technology available. The technology was developed by Sony Corporation, who owns complete rights to it. The Trinitron design has helped the company lead the market in the manufacturing of TVs and monitors for many years. 125 more words

ZEROFAIL Southeast

IT Security, where we were and where we are now

We are in a new year, which also mean new threats, new ways of threats to your network. Every year we read more headlines about company’s data being exposed, datacenters being breached. 683 more words

Article

Tech Terms: TIFF

Stands for “Tagged Image File Format.” It is a graphics file format created in the 1980s to be the standard image format across multiple computer platforms. 69 more words

ZEROFAIL Southeast

Tech Terms: Terabyte

A terabyte is 10 to the 12th power or 1,000,000,000,000 bytes.

One terabyte (abbreviated “TB”) is equal to 1,000 gigabytes and precedes the petabyte unit of measurement. 155 more words

ZEROFAIL Southeast

Tech Terms: Telnet

This is a program that allows you log in to a Unix computer via a text-based interface. If you have an account on a Telnet server, you can access certain resources on the system such your home directory, your e-mail account, FTP files, etc. 26 more words

ZEROFAIL Southeast

Tech Terms: TCP/IP

Stands for “Transmission Control Protocol/Internet Protocol.” These two protocols were developed in the early days of the Internet by the U.S. military. The purpose was to allow computers to communicate over long distance networks. 244 more words

ZEROFAIL Southeast