加载中...

Dictionary Home » Computer Definitions

Computer, Hacker & Telecom

How Does a Firewall Work?

A firewall works like a security gate for your computer. When it is installed, it allows certain information to pass through if that information is safe and trusted. If information is not trusted or if something tries to pass through that does not belong, then the firewall stops it in its tracks. 

YourDictionary Resources

Computer Desktop Encyclopedia

The Computer Desktop Encyclopedia is the oldest computer reference manual in history, dating back to 1981. The 20,000+ definitions cover everything in software and hardware and equip you with the knowledge to understand the inside and outside of your computer. Whether you have a PC, a Mac, Unix, or Linux, your operating system is covered, right along with its peripherals.

 

Webster's New World Hacker Dictionary

 Webster’s New World Hacker Dictionary contains more than just the 875+ definitions and explanations of Hacker slang. It also contains case studies, theories on hacking, stories of famous hackers, details about Internet security tools, references for further reading, and useful tips and tricks on how to protect your computer. Laws on Internet security, and legal cases relating to hacking, are also included  so you get more than just a guide to how Hacker’s talk--you also get the whole picture of how hacking has affected culture and society.

Buy the print version

Webster's New World Telecom Dictionary

Telecom, short for telecommunication, is a broad field that has become even broader with the advent of new technologies. Webster’s New World Telecom Dictionary provides explanations on words and concepts within the fields of data, video, multimedia communications systems, network technologies, applications, and industry regulation. 

Buy the print version

Browse Computer, Hacker & Telecom Definitions

Computer Terms You Should Know

app

The definition of an app is short for application and is software for use on a smart phone or computer. (noun) An example of an app is the Yelp app for the iPhone.…

more…

Cache

To store data in a faster storage system or a storage system closer to the usage of the data. Processor caches store data from (slower) main memory on special chip cache memory, where it can be accessed and reused much more efficiently. Web files can be c…

more…

CAPTCHA

In 2000, Luis von Ahn, Manuel Blum, and Nicholas J. Hopper, affiliates of Carnegie Mellon University, and IBMÂ’s John Langford coined this term, which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart.” The …

more…

cloud

A wide area network (WAN) commonly is depicted as a cloud, which serves to obscure its complex inner workings from view. Data just pops in on one side of the cloud and pops out on the other side, so to speak. …

more…

Cookie

Contrary to what some individuals think, cookies are not in themselves a security risk. They are simply small bits of data that are commonly transmitted from a Web server to a Web browser. Cookies can also be entirely processed client-side. The browser st…

more…

firewall

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems, servers, databases, and networks. A firewall may also act to prevent internal users from accessing unauthorized external resources. …

more…

malware

Software that is harmful or evil in intent. See also spyware, Trojan horse, virus, and worm. …

more…

RAM

Semiconductor-based computer memory that stores program code and data in locations that can be accessed in any order. As the primary working memory of a computer, RAM stores program code and data that can be accessed, read, and written to by the central p…

more…

RSS

A metadata push technology, i.e., a technology that can identify changes in data and initiate a content push to the end user, without the user having to search it out and pull it from the site.The term RSS is an umbrella term variously used to describe a …

more…