Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

651 total results found

DomainKeys Identified Mail

Documentation

aliases: DKIM An email authentication protocol that detects and blocks spoofed emails by validating the sender's domain address. #XI

Sender Policy Framework

Documentation

aliases: SPF An email authentication protocol detects and blocks spoofed emails by validating the sender's domain address and by double-checking the IP of the sender's domain. If the sent domain's IP doesn't match one in the DNS records, the email is block...

Domain based Message Authentication, Reporting, and Conformance

Documentation

aliases: DMARC An email authentication protocol that combines the functionality of DKIM and SPF, while adding the ability to specify what happens to flagged emails, whether they're deleted or set aside in a sort of a 'spam' mailbox. #XI

Mail Protocols

Documentation

An enumeration and description of the three major email protocols. Sending and receiving emails is surprisingly complicated. Luckily, I've covered the basics of SMTP, IMAP and POP3 over here. SMTP The one that sends emails. IMAP The first one that receives ema...

Dynamic Host Configuration Protocol

Documentation

aliases: DHCP A system that automatically sets and manages network connection configuration settings for incoming hosts. DHCP removes the need to manually configure the network connection settings of an incoming host, as some do when managing small network...

Access Gateway

Documentation

The second IoT layer. Refers to the point where the analog/physical data captured by the edge technology is converted into digital data and prepared for communication over the Internet. #XI

Internet

Documentation

The global computer network that communicates via standardized protocols. The third IoT layer. Refers to the main bridge between endpoints in an IoT system. This is the point that the data prepared by the access gateway is sent. The Internet is what connects d...

Middleware

Documentation

The fourth IoT layer. Refers to the processing that happens after data captured and prepared by the edge technology and access gateway is received by the cloud. Here: in-depth processing data management device management data aggregation data filtering device...

Printer

Documentation

A type of hardware that converts image and text files on a system and prints them onto a piece of paper. Printers are also peripheral devices. Types of printers include: Laser Printer Second-Impact-Dot-Printers 13.3.5 3D Printers #II

Access Control List

Documentation

aliases: ACL The most basic rulebook used in firewalls. Note: access control lists process rules from top to bottom. When making ACL rules, make sure that the most important rules pointed towards the top. #XIV

Firewall

Documentation

A hardware device or software program that monitors and filters incoming and outgoing network traffic depending on rules. Features traffic type detection source & destination address-port logging usage of an ACL packet filtering (based on destination or type ...

Windows Network Locations

Documentation

An enumeration of the network location profiles used in Microsoft Windows. They're used to set default network privacy settings for a host running Windows. Private all other users and devices are known and trusted network discovery is enabled files and printe...

Network Address Translation

Documentation

A network protocol that is used to allow multiple computers to share a single public IP address for use over the Internet. NAT is required to be enabled on the default gateway for hosts on the internal network to access the Internet. NAT was designed to limit ...

Backup Policy

Documentation

The type of security policy that dictates how data backups are run at an organization. This includes information like: the type of backup that's performed who is permitted to access the restricted/secure areas where the backup data is stored how access is gra...

Asset Management Database

Documentation

A database that stores information about assets procured and owned by an organization. Asset management databases track and optimize the performance, utilization, and lifecycle of assets. They are used to gather information regarding availability, configuratio...

Brownout

Documentation

Undervoltage that lasts seconds (lights may dim)

Blackout

Documentation

Complete power failure.

Knowledge Base

Documentation

A web-based collection of articles and documents related to an organization's FAQ. This collection is accessible by both the company's technicians and their end users. The knowledge base is used to: find/provide simple self-troubleshooting info changing a pa...