|
Subject |
Replies |
Started by |
Views |
Last post |
|
|
Inbound Telemarketing Inbound telemarketing is a process
whereby call centers are created to
accept telephone orders, consumer
inquiries, and customer
|
0
|
Tanya
|
1284
|
April 30, 2007, 10:28:23 AM
by Tanya
|
|
|
Pub Scanner Someone who scours the net for anonymous
access FTP sites which permit the
creation and deletion of files. These
are then exploi
|
0
|
Tanya
|
1284
|
June 10, 2007, 02:23:37 AM
by Tanya
|
|
|
Queue Queue
<programming> A
{first-in first-out} data structure used
to sequence multiple demands for a
resour
|
0
|
Tanya
|
1289
|
June 09, 2007, 02:37:01 PM
by Tanya
|
|
|
Proxy A third party server which acts as an
anonymous go between whenever you
request a web page or contact a remote
server. The messa
|
0
|
Tanya
|
1291
|
June 10, 2007, 02:21:09 AM
by Tanya
|
|
|
OEM An acronym for Original Equipment
Manufacturer. OEM software products are
repackaged versions of the full retail
product. They a
|
0
|
Tanya
|
1292
|
June 10, 2007, 02:13:20 AM
by Tanya
|
|
|
Resume The ability to stop and start
downloading / uploading a file whenever
you choose without having to start from
the beginning agai
|
0
|
Tanya
|
1294
|
June 10, 2007, 02:27:12 AM
by Tanya
|
|
|
search engine marketing search engine marketing
Search
engine Marketing is the technique of
utilizing search engines
|
0
|
Khushi
|
1296
|
June 17, 2007, 07:41:50 PM
by Khushi
|
|
|
RM File Shorthand for Real Media, a file format
used to encode video sequences, which
can only be played back using the
"Real Playe
|
0
|
Tanya
|
1298
|
June 10, 2007, 02:29:18 AM
by Tanya
|
|
|
Cgi Scripts These are referrers which are used in
url’s. When you click on a link with a
?cgi reference you are directed to a
sponsor’s
|
0
|
Tanya
|
1299
|
June 10, 2007, 01:08:44 AM
by Tanya
|
|
|
BSOD Many people read about BSODs on bulletin
boards and think that they're being
insulted, but there is no need to get
paranoid
|
0
|
Tanya
|
1299
|
June 10, 2007, 01:06:34 AM
by Tanya
|
|
|
Raped A release is branded with this term if
it has been damaged beyond repair during
the ripping process.
|
0
|
Tanya
|
1301
|
June 10, 2007, 02:28:44 AM
by Tanya
|
|
|
New computer term : Phishing Phishing
(FISHing)
Phishing is an attempt to use
social engineering and/or technical
subterfuge to steal
|
0
|
Mark David
|
1303
|
January 04, 2007, 11:24:56 PM
by Mark David
|
|
|
Keyboard Keyboard
The set of
typewriter-like keys that enables you to
enter data into a computer. Computer
keyboards ar
|
0
|
Tanya
|
1305
|
June 03, 2007, 07:53:34 PM
by Tanya
|
|
|
network cables network cables
The most widely
used network cables are Ethernet cables.
Ethernet is a frame-based transmission
|
0
|
Tanya
|
1306
|
June 03, 2007, 08:46:12 PM
by Tanya
|
|
|
Patch We all know games and applications
aren't perfect. When they are
released we would hope that they have
been thoroughly test
|
0
|
Tanya
|
1309
|
June 10, 2007, 02:17:04 AM
by Tanya
|
|
|
Autodialer Autodialers are either physical devices
or else computer applications that make
automated phone calls. Generally used in
the cal
|
0
|
Mark David
|
1309
|
February 18, 2007, 11:06:09 PM
by Mark David
|
|
|
Modchip Very common website sponsor found on
warez sites. They don’t mind their
banners being used on illegal software
sites because t
|
0
|
Tanya
|
1312
|
June 10, 2007, 02:07:01 AM
by Tanya
|
|
|
scheduling software scheduling software
Scheduling
software is an invaluable organization
tool used to simplify scheduling of meet
|
0
|
Khushi
|
1314
|
June 17, 2007, 07:39:27 PM
by Khushi
|
|
|
IDS Short for Intrusion Detection System. A
network security system designed to
identify intrusive or malicious behavior
via monitor
|
0
|
Tanya
|
1317
|
April 30, 2007, 10:24:53 AM
by Tanya
|
|
|
Distro A concise means of referring to a
distribution FTP site. These are huge
storage areas which act as a springboard
for the transfe
|
0
|
Tanya
|
1319
|
June 10, 2007, 01:18:52 AM
by Tanya
|