An older programming interface developed by Microsoft to reuse components which facilitate the provision of content (e. g. videos and games) on websites. The new Microsoft «Edge» browser does not support ActiveX, constituting an unofficial Microsoft announcement that this technology is now obsolete.
This is a method for encrypting data. AES can for instance be used to encrypt transmissions inside a WLAN (WPA2) network. This encrypts anything exchanged between the WLAN router and a device connected wirelessly.
Wi-Fi Protected Access 2, Wireless Local Area Network
An intrinsically legal way of financing «free» software. This is either implemented via ad banners inside the actual software, or via the installation of additional third party software.
Is a character coding containing 95 printable and 33 non-printable characters. The printable characters include the Latin alphabet (A-Z, a-z), the ten Arabic numerals (0-9) as well as some punctuation marks (sentence symbols, word symbols) and other special characters.
The word «Applet» is made up from the terms «application» and «snippet» and either describes a Java program running inside a browser or a computer program which cannot be run as a stand-alone application.
This is the process of checking the purported identity of a person or a computer based on a certain characteristic (e. g. password, chip card or fingerprint).
The allocation of permissions. Based on permissions, authorisation is granted to access resources (e. g. files, software, payments, etc.) after successful identification and authentication.
With software, this word usually denotes non-documented access which allows manufacturers (or third parties) to access users’ software or data from the outside. There is also malware which is able to open a back door. This allows criminals to access a computer and then use it for their own ends, e. g. to join a bot net.
Data back-up, where electronic information (data) is copied to an external storage medium (e. g. an external hard drive). Back-ups are generally run at regular intervals. There is a distinction between an incremental back-up, where only changes since the last back-up are saved, and complete back-ups.
This is the smallest information unit in electronic data processing, equivalent to a yes/no decision or 0/1 in a digital data record.
Participate in one of our «eBanking – but secure!» courses (in GERMAN, FRENCH and ITALIAN language only) and learn how the «5 steps for your security» can protect you when e-banking!
Copyright © 2019 – All rights reserved. Lucerne School of Information Technologies