A DMZ is usually created by your firewall to provide a location for devices such as Web servers that you want to be accessible from the public Internet.ĭNS: D omain Name System (or Server), an Internet service that translates domain names into IP addresses. Typically, this is the router or firewall that connects the local network to the public Internet, although it might also be a router that connects to another remote server or computer within the same company.ĭMZ: D emilitarized Zone, a separate area of your network that is isolated from both the Internet and your protected internal network. If you have a server on your network, configuring that server as a DHCP server will make it much easier to add or reconfigure individual workstations on the network.ĭefault Gateway: in a TCP/IP network, this is the gateway that computers on that network use to send data to, and receive it from, computers and networks outside of the local network. Cookies aren’t actually capable of damaging your computer, but they can compromise your identity.ĬPU: C entral Processing Unit, the brains of a computer (see processor below).ĭHCP: D ynamic Host Configuration Protocol, a method for dynamically assigning IP addresses to devices on request, rather than explicitly programming an IP address into each device. Originally designed to be helpful, cookies can save and share information such as your purchasing habits, your location, and even your identity. This software is not designed for virus, worm, or hacker prevention.Ĭookie: a file placed on your computer to allow websites to remember something. Although this usually refers to Web content, some programs also screen inbound and outbound e-mails for offensive information. Security is a major concern where BYOD is allowed (see MDM).Ĭloud Computing: internet based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, as with the electricity grid.Ĭontent Filtering: software that prevents users from accessing objectionable content via your network. An example of this would be end-users accessing a corporate network via personal tablets or smart phones. ![]() ![]() Newer Blackberry devices aren’t relying as heavily on Blackberry Enterprise Servers and are now offering “active sync” to communicate directly with Microsoft Exchange.īrowser Hijacker: malicious software that changes your default homepage and search engine without your permission.īYOD: B ring Your Own Device, the concept of using non-company-owned assets to access a company-owned resource. These backups are image-based and can be used to perform a bare-metal restore to get your network up and running fast.īlackberry Enterprise Server (BES): a software and service that connects to messaging and collaboration software (Microsoft Exchange, Lotus Domino, Novell GroupWise) on enterprise networks and redirects emails and synchronizes contacts and calendaring information between servers, workstations and BlackBerry mobile devices. ![]() This “server” takes “snapshot” backups of the office servers as often as every 15 minutes and sends a copy of these backups offsite every day. Could you please add these terms to our IT Dictionary section under Resources.ĪSP: A pplication Service Provider, a third-party company that manages and distributes software-based services and solutions to their customers over a wide-area network, usually the Internet.īDR: B ackup and Disaster Recovery Server, a hardware appliance physically housed at the client’s office. ![]() This software can slow down your computer and internet browsing experience. Adware can be legitimate software, but is often installed maliciously without the consent of the end-user. AdWare: software that displays advertising and/or pop-ups on your computer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |