Advanced Search
Search Results
651 total results found
DomainKeys Identified Mail
aliases: DKIM An email authentication protocol that detects and blocks spoofed emails by validating the sender's domain address. #XI
Sender Policy Framework
aliases: SPF An email authentication protocol detects and blocks spoofed emails by validating the sender's domain address and by double-checking the IP of the sender's domain. If the sent domain's IP doesn't match one in the DNS records, the email is block...
Domain based Message Authentication, Reporting, and Conformance
aliases: DMARC An email authentication protocol that combines the functionality of DKIM and SPF, while adding the ability to specify what happens to flagged emails, whether they're deleted or set aside in a sort of a 'spam' mailbox. #XI
Mail Protocols
An enumeration and description of the three major email protocols. Sending and receiving emails is surprisingly complicated. Luckily, I've covered the basics of SMTP, IMAP and POP3 over here. SMTP The one that sends emails. IMAP The first one that receives ema...
Dynamic Host Configuration Protocol
aliases: DHCP A system that automatically sets and manages network connection configuration settings for incoming hosts. DHCP removes the need to manually configure the network connection settings of an incoming host, as some do when managing small network...
Access Gateway
The second IoT layer. Refers to the point where the analog/physical data captured by the edge technology is converted into digital data and prepared for communication over the Internet. #XI
Internet
The global computer network that communicates via standardized protocols. The third IoT layer. Refers to the main bridge between endpoints in an IoT system. This is the point that the data prepared by the access gateway is sent. The Internet is what connects d...
Middleware
The fourth IoT layer. Refers to the processing that happens after data captured and prepared by the edge technology and access gateway is received by the cloud. Here: in-depth processing data management device management data aggregation data filtering device...
Printer
A type of hardware that converts image and text files on a system and prints them onto a piece of paper. Printers are also peripheral devices. Types of printers include: Laser Printer Second-Impact-Dot-Printers 13.3.5 3D Printers #II
Access Control List
aliases: ACL The most basic rulebook used in firewalls. Note: access control lists process rules from top to bottom. When making ACL rules, make sure that the most important rules pointed towards the top. #XIV
Firewall
A hardware device or software program that monitors and filters incoming and outgoing network traffic depending on rules. Features traffic type detection source & destination address-port logging usage of an ACL packet filtering (based on destination or type ...
Windows Network Locations
An enumeration of the network location profiles used in Microsoft Windows. They're used to set default network privacy settings for a host running Windows. Private all other users and devices are known and trusted network discovery is enabled files and printe...
Network Address Translation
A network protocol that is used to allow multiple computers to share a single public IP address for use over the Internet. NAT is required to be enabled on the default gateway for hosts on the internal network to access the Internet. NAT was designed to limit ...
Backup Policy
The type of security policy that dictates how data backups are run at an organization. This includes information like: the type of backup that's performed who is permitted to access the restricted/secure areas where the backup data is stored how access is gra...
Asset Management Database
A database that stores information about assets procured and owned by an organization. Asset management databases track and optimize the performance, utilization, and lifecycle of assets. They are used to gather information regarding availability, configuratio...
Brownout
Undervoltage that lasts seconds (lights may dim)
Blackout
Complete power failure.
Knowledge Base
A web-based collection of articles and documents related to an organization's FAQ. This collection is accessible by both the company's technicians and their end users. The knowledge base is used to: find/provide simple self-troubleshooting info changing a pa...