Page 148 - Webapplication11_C11_Flipbook
P. 148

Ð Ð Telnet is a protocol that allows you to connect to a remote machine.
                Ð Ð IRC protocol is utilised for chatting.
                Ð Ð VOIP (voice over internet protocol) allows voice to be sent over a packet switched network rather than a public switched
                    telephone network.
                Ð Ð A MAC (Media Access Control) address is a unique 12-digit hexadecimal number provided to each NIC (6 digits for
                    manufacturer code and 6 digits for serial number).
                Ð Ð Each node on a network is given an IP (Internet Protocol) address, which is a four-digit hexadecimal number.
                Ð Ð A Domain Name System (DNS) name is a name given to a server (DNS).
                Ð Ð The process of obtaining a corresponding IP address from a domain name is known as domain name resolution.
                Ð Ð Malware refers to malicious software (programmes) that are meant to disrupt normal system functionality by inflicting harm
                    to the system, or to gain unauthorised access to the system, or to prevent legitimate users of computer resources access.
                Ð Ð A virus is a malicious programme that infects the host programme by attaching itself to it.

                Ð Ð A worm is a self-contained object that works on its own.
                Ð Ð Trojan Horses impersonate legitimate programmes to deceive users into installing them.
                Ð Ð A cookie is a small text file that usually contains the name of the website from which it came, as well as a unique ID tag.
                Ð Ð A firewall is a network security mechanism that is either hardware or software based.
                Ð Ð Cybercrime is defined as a crime in which a computer or the internet is utilised in an unauthorised manner to harm a user.
                Ð Ð Cyber law is an attempt to reconcile the issues posed by human activity on the internet with a legal system based on laws
                    that apply to the physical world.
                Ð Ð Intellectual Property Rights (IPR) are the rights granted to an individual over their own creation are known as intellectual
                    property rights.
                Ð Ð Hacking  was  a  phrase  used  to  describe  people  who  engage  in  inoffensive  technology  experiments  and  educational
                    activities.
                Ð Ð Cracking is a means of gaining unauthorised access to a computer with the goal of causing harm.






































                146     Touchpad Web Applications-XI
   143   144   145   146   147   148   149   150   151   152   153