FA
Today, Tuesday، 24 Dec 2024 - 22:13
Mokhafaf

Acronym Finder

VIRUS
What is VIRUS ?
Vital Information Resources Under Seize
Computer virus (in English: Computer virus is a computer program that when run, the program, etc. by modifying other computer programs and enter a code specific to the ... repeats itself. When this proliferation is successful it is said that regions seen as computer viruses are transmitted.virus authors use social engineering tricks, threaten detailed knowledge in Windows, and employ a variety of mechanisms to host a new host and often use sophisticated anti-tracking / stealth strategies to evade virus software. The motivations for causing the virus can include profits or political ones.

now, virus, computer annual billions of dollars in economic damages, enter into that cause it malfunction of system, wasting computer resources, School of corrupted data, increasing maintenance costs or stealing personal information or company is. In response free and open source anti-virus tools have been developed and industrial anti-virus software has provided virus protection to users of various operating systems. Since 2005, the industry has launched, there is no virus software capable of detecting all computer viruses (especially new versions), so computer security researchers are actively searching for new ways to identify antivirus solutions more effectively before they multiply widely among computers....
MITM
What is MITM ?
Man In The Middle
The middle person Attack (Man-in-the-middle attack) wrote with the short MITM and also known as the bucket brigade attack, or sometimes as the genus attack. In cryptography and computer security attack a person, Middle, manner of collision avoidance is activated rusher, communication and the marriage with the victim, establishes and makes messages between them playback does. In such a way that it believes them to speak in a direct and private relationship with each other, while all their conversations are controlled by the attacker. The attacker must have the ability to intercept all messages sent between the two victims and leave a fresh message to work in many situations. For instance, an attacker with an unencrypted message receiving a wireless access point (AI triple 802.11) could fit himself as a middle man.

a middle man attacker can succeed if he impersonates any endpoints with another consent. This is a bilateral (or lack of) authentication attack. Most encryption protocols include some forms of endpoints authentication, especially to prevent middle man attacks. For instance, the transmission layer security (SSL) can authenticate one or both parties using a trusted two-way certificate license....
VSCode
What is VSCode ?
Visual Studio Code
Open source software coding all languages that were published by Microsoft Corporation in 2015....
TL
What is TL ?
TimeLine
TL (TL) on Twitter stands for time line or the same page that we see tweets inside it....
IPFS
What is IPFS ?
InterPlanetary File System
An open source project that creates a protocol for storing and accessing distributed content....
DAPP
What is DAPP ?
Decentralized Application
Applications that run on a P2P network of computers rather than one central computer. This allows the software to run on the internet without being controlled by a single entity....
SQS
What is SQS ?
Simple Queue Service
Amazon Simple Queue Service (Amazon SQS) is a distributed message queuing service introduced by Amazon.com in late 2004. It supports the programmatic sending of messages via web service applications as a way to communicate over the Internet. SQS is intended to provide a highly scalable hosted message queue that resolves issues arising from the common producer-consumer problem or connectivity between producer and consumer....
HEIF
What is HEIF ?
High Efficiency Image File
High Efficiency Image File (digital image format)...