Recently Updated Pages
Security Policy
A document or collection of documents that provide information about how the organization structu...
Transmission Control Protocol
aliases: TCP Transmission Control Protocol: connection oriented data transfer protocol that e...
User Datagram Protocol
aliases: UDP A connectionless protocol that sends packets to the receiver regardless of check...
Operating System
A collection of software on a computer that allows the user to access and use the computer's memo...
Server
Servers provide file storage, manage Active Directory, provide IP addresses using DHCP, and more....
Routers
An ethernet router is a device that connects two or more network segments or subnets. Common rout...
Purchase Order
A document that states a representative of an organization has permission to place an order and t...
Procedure
A procedure defines a desired outcome, and outlines the steps that, when taken, should lead towar...
Policies
Rules and procedures that have been set by an organization to address a particular problem or con...
Graphical User Interface
aliases: GUI A software program that uses icons, menus, and other visual components to intera...
exFAT
A special file system designed for flash drives with large storage capacities (greater than 32 GB...
Universally Unique Identifier
aliases: UUID A 128-bit label used to identify objects in computer systems. Also known as Glo...
Apple Keychain
The main password management tool used in macOS. Features: passwords for websites for system lo...
Chrome OS
A proprietary operating system developed and owned by Google, based on Linux. Chrome OS offers a ...
Samba
The Samba Project is the standard Windows interop suite for Linux and other Unix-based operating ...
Group Policy Editor
A specialized software program installed on Microsoft-Windows machines, used to edit internal sys...
Interfaces
An OS component responsible for handling interaction between the user and the system. Command-Lin...
General Data Protection Regulation
Provisions and requirements protecting the personal data of EU citizens, disallowing the transfer...
Honeypot
A host system or network (called a honeynet) to bait attackers into trying to exploit it. The att...
IEEE 802.1p
A three-bit CoS priority field within the greater 802.1Q format running at layer 2. 802.1p can be...