|
Subject |
Replies |
Started by |
Views |
Last post |
|
|
security policies security policies
A security policy
is a document that outlines rules for
computer network ac
|
0
|
Khushi
|
1677
|
June 17, 2007, 07:49:17 PM
by Khushi
|
|
|
Trading Swapping warez, file for file via FTP,
ICQ etc. Not usually approved of by the
real warez community who believe that
warez shoul
|
0
|
Tanya
|
1683
|
June 10, 2007, 02:36:40 AM
by Tanya
|
|
|
SSL SSL
Short for Secure Sockets Layer,
SSL is a protocol originally developed
by Netscape for tr
|
0
|
Khushi
|
1688
|
June 17, 2007, 08:53:20 PM
by Khushi
|
|
|
Gold A piece of software is said to have gone
gold when the final version is complete
and it is ready to ship to the public.
|
0
|
Tanya
|
1696
|
June 10, 2007, 01:31:09 AM
by Tanya
|
|
|
SSL Certificate SSL Certificate
An SSL digital
certificate is an electronic file that
uniquely identifies ind
|
0
|
Khushi
|
1709
|
June 17, 2007, 08:54:37 PM
by Khushi
|
|
|
Bug Tracking Bug Tracking Software is used by
developers to record defects and changes
in software products. Bug-tracking
solutions are desig
|
0
|
Alex
|
1716
|
February 18, 2007, 11:22:44 PM
by Alex
|
|
|
Budgeting Software Budgeting Software is powerful
management software to create flexible
and sophisticated budgets, specific to
your needs. Budgeti
|
0
|
Alex
|
1722
|
February 18, 2007, 11:21:10 PM
by Alex
|
|
|
Survey Software Survey Software
Survey software
describes the packages used to design,
manage, and analyze cu
|
0
|
Khushi
|
1726
|
June 17, 2007, 08:57:50 PM
by Khushi
|
|
|
CMMS CMMS Short for Computerized Maintenance
Management Systems, CMMS are software
systems to automate and streamline the
maintenance
|
0
|
Alex
|
1738
|
February 18, 2007, 11:32:21 PM
by Alex
|
|
|
Gamez Pretty self-explanatory this one.
|
0
|
Tanya
|
1743
|
June 10, 2007, 01:29:28 AM
by Tanya
|
|
|
software escrow software escrow
Software escrow
refers to the deposit of the
software's source code into
|
0
|
Khushi
|
1745
|
June 17, 2007, 08:47:13 PM
by Khushi
|
|
|
Six Sigma Six Sigma
Six Sigma is a quality
management program to achieve "six
sigma" levels o
|
0
|
Khushi
|
1749
|
June 17, 2007, 08:45:44 PM
by Khushi
|
|
|
spam filter spam filter
A device for blocking
unsolicited junk email, known as spam.
Spam filters can be
|
0
|
Khushi
|
1753
|
June 17, 2007, 08:51:00 PM
by Khushi
|
|
|
Voting Members of the warez scene are very keen
to reach the number one slot of top
lists such as Voodoo, Top 60 etc. and
will therefor
|
0
|
Tanya
|
1756
|
June 10, 2007, 02:43:29 AM
by Tanya
|
|
|
Toner Toner
Toner is the dry ink
powder used in laser printers, fax
machines and copiers. These machines
generally a
|
0
|
Vatsal
|
1767
|
July 16, 2007, 03:27:23 PM
by Vatsal
|
|
|
FTP Client / Browser A program used to access, upload and
download data from FTP sites.
|
0
|
Tanya
|
1840
|
June 10, 2007, 01:28:34 AM
by Tanya
|
|
|
Trainer A small, executable program which sits
in your taskbar while you play a game.
Hotkeys are associated with cheat
commands so that
|
0
|
Tanya
|
1856
|
June 10, 2007, 02:37:18 AM
by Tanya
|
|
|
SYN Flood SYN Flood
A SYN Flood attack is a
type of denial of service attack meant
to bring a network t
|
0
|
Khushi
|
1859
|
June 17, 2007, 08:58:55 PM
by Khushi
|
|
|
trade show displays trade show displays
Trade shows
provide businesses with an excellent
opportunity to showcase
|
0
|
Vatsal
|
1860
|
July 16, 2007, 03:28:07 PM
by Vatsal
|
|
|
What is IPv6 or Internet Protocol Version 6 ? Internet Protocol version 6 (IPv6) is a
network layer IP standard used by
electronic devices to exchange data
across a packet-sw
|
0
|
Shashank Asthana
|
1882
|
November 05, 2006, 12:58:38 PM
by Shashank Asthana
|