The Microsoft NET Framework
Ø is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.
Ø
The NET Framework is a new execution
environment for Windows programs. It is available as an optional upgrade for any version of Windows after (but not including)
Windows 95. Specifically, it can be added to Windows 98, NT 4.0, Millennium Edition, Windows 2000, and Windows XP.
Microsoft distributes the NET Framework in three forms:
- The .NET Framework Redistributable
package contains everything needed to run a program under the .NET Framework. It includes the Common Language Runtime, DLLs,
and the ASP.NET extension for the IIS Web Server. This file can be downloaded from the Microsoft Web site (21 megabytes) and distributed with any application that needs it.
- The .NET Framework SDK includes
the Redistributable Package, and free "command line" compilers, development tools, and documentation. It can be downloaded from the Microsoft Web site (131 megabytes) and installed on any development machine.
- Visual Studio.NET is a program
product sold by Microsoft that wraps the compilers and tools in an IDE with project management, code generating wizards, editor,
and debugger. This product is purchased from any software vendor, although many programmers will get their copy through a
campus or corporate multi-user license or a MSDN subscription.
Active Server Pages (ASP)
ü also known as Classic ASP, was Microsoft's first server-side script engine for dynamically-generated web pages. Initially released as an add-on to Internet Information Services (IIS) via the Windows NT 4.0 Option Pack, it was subsequently included as a free component of Windows Server (since the initial release of Windows 2000 Server).
ü Developing rich functionality in ASP websites is enabled by the active scripting engine's support of the Component Object Model (COM), with each object providing a related group of frequently-used functions and data attributes. In ASP 2.0 there were six built-in objects: Application, ASP Error, Request, Response, Server, and Session. Session, for example, is a cookie-based session object that maintains the state of variables from page to page. Functionality is further extended by objects which, when instantiated, provide access to the environment
of the web server; as an example File System Object (FSO) is used to create, read, update and delete files.
Access
o Microsoft Office Access, previously known as Microsoft Access,
is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software development tools. It is a member of the Microsoft Office suite of applications and is included in the Professional and higher versions for Windows and also sold separately. There
is no version for MacOS or for Microsoft Office Mobile.
o
Access
stores data in its own format based on the Access Jet Database Engine. It can also import or link directly to data stored in other Access databases, Excel, SharePoint lists, text, XML, Outlook, HTML, dBase, Paradox, Lotus 1-2-3, or any
ODBC-compliant data container including Microsoft SQL Server, Oracle, MySQL and PostgreSQL. Software developers and data architects can use it to develop application software and non-programmer "power users" can use it to build simple applications. It supports some object-oriented techniques but falls short of being a fully object-oriented development tool.
Access Privileges
v In the administration of a multi-user computer system, a privilege is an identified
right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands,
or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular
device, a network administrator assigns privileges to users. System software then automatically enforces these privileges.
Active
hyperlink
ü A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking on the hyperlink.
When designing a Web page, you can choose a font color to represent active hyperlinks.
Administrator
(as an IT source)
- A person who manages a computer, a network or specific software components. In a personal computer, users are typically
the administrators, also known as "system administrators" and have rights to perform all operations in the computer.
Authentication
ü General: Verification of the genuineness of a document or signature, to make it effective or valid. It usually takes the form of a sealed or stamped certificate that confirms the authority of a public official (such as judge or a notary public) or of a signatory.
ü Computer access: Verification of the identity of a user through a code such as a password.
ü Electronic-commerce: Measure employed to ensure that the entity requesting access to an online system is what or who it claims to be, and to counter (by using passwords, authentication certificate, or other identification devices or procedures) any inappropriate or unauthorized access.
Data Administrator
ü A person responsible for analyzing data requirements within an organization and modeling the data and data flows
from one department to another. Formerly called a "data administrator," the database analyst may also perform "database administration"
functions, which deal with the particular databases employed.
Electronic commerce
Ø Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying
and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with wide-spread Internet usage. A wide variety of
commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.
e-Government
ü e-Government (short for electronic government, also known as e-gov, digital government, online government or transformational government) is a diffused neologism used to refer to the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, businesses, and other arms of government.
Encryption
Business Definition:
- a means of encoding information, especially financial data,
so that it can be transmitted over the Internet without being read by unauthorized parties.
Within an Internet security system, a secure server uses
encryption when transferring or receiving data from the Web. Credit card information, for example, which could be targeted
by a hacker, is encrypted by the server, turning it into special code that will then be decrypted only when it is safely within
the server environment. Once the information has been acted on, it is either deleted or stored in encrypted form.
Wiktionary Definition:
- In cryptography, encryption is the process of obscuring information
to make it unreadable without special knowledge, key files, and/or passwords.
Information technology
o Information technology (IT), as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.
o
Today, the term information technology
has ballooned to encompass many aspects of computing and technology, and the term has become very recognizable. The information
technology umbrella can be quite large, covering many fields. IT professionals perform a variety of duties that range from
installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems.
o When computer and communications technologies are combined, the result is information technology, or
"infotech". Information Technology (IT) is a general term that describes any technology that helps to produce, manipulate,
store, communicate, and/or disseminate information. Presumably, when speaking of Information Technology (IT) as a whole, it
is noted that the use of computers and information are associated.
o The term Information Technology (IT) is sometimes said to have been coined by Jim Domsic of Michigan
in November 1981.[citation needed] Domsic, who worked as a computer manager for an automotive related industry, is supposed to have created the term
to modernize the outdated phrase "data processing". The Oxford English Dictionary, however, in defining information technology
as "the branch of technology concerned with the dissemination, processing, and storage of information, esp. by means of computers"
provides an illustrative quote from the year 1958 (Leavitt & Whisler in Harvard Business Rev. XXXVI. 41/1 "The new technology
does not yet have a single established name. We shall call it information technology.") that predates the so-far unsubstantiated
Domsic coinage.
o In recent years ABET and the ACM have collaborated to form accreditation and curriculum standards for degrees in Information Technology as a distinct field of study separate from both Computer Science and Information Systems.
Information Technology Resource
(IT Resource)
§ A resource used for electronic storage,
processing or transmitting of any data or information, as well as the data or information itself. This definition includes
but is not limited to electronic mail, voice mail, local databases, externally accessed databases, CD-ROM, recorded magnetic
media, photographs, digitized information, or microfilm. This also includes any wire, radio, electromagnetic, photo optical,
photo electronic or other facility used in transmitting electronic communications, and any computer facilities or related
electronic equipment that electronically stores such communications.
Intellectual Property Rights (IPR)
o
Intellectual
Property Rights (IPR) is monopoly rights granted by the State to an inventor/author for the protection of certain intangible
creations (ideas, works of art, software, etc.) These are essentially negative rights to prevent others from doing something
and are protected territorially.
o
With
the advent of the era of knowledge and information technology, today, intellectual capital has gained enormous importance.
Consequently, intellectual property and rights attached there to have become a precious commodity and are hence fiercely protected.
o
Legal
protection is also a fall out of the intensive globalization and trade that is taking place among countries across the world.
International trade and commercial obligations have been made increasingly dependent on IP (Intellectual Property) commitments.
International
Organization for Standardization
o (Organisation internationale de normalisation)widely known as ISO (pronounced
/ˈɑɪsəʊ/), is an international-standard-setting body composed of representatives from various national standards organizations. Founded on 23 February 1947, the organization promulgates worldwide proprietary industrial and commercial standards. It is headquartered in Geneva, Switzerland.[1] While ISO defines itself as a non-governmental organization, its ability to set standards that often become law, either through treaties or national standards, makes it more powerful than most non-governmental organizations. In practice,
ISO acts as a consortium with strong links to governments.
Malicious Code
o (also called vandals) is a new breed of Internet threat that cannot be efficiently
controlled by conventional antivirus software alone. In contrast to viruses that require a user to execute a program in order
to cause damage, vandals are auto-executable applications.
Malicious code can take the form of:
· Java Applets
· ActiveX Controls
· Scripting languages
· Browser plug-ins
· Pushed content
Malware (virus) Detection Software
o Malware, a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile,
intrusive, or annoying software or program code. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
o Software is considered malware based on the perceived intent of the creator
rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of several U. S. states, including California and West Virginia.
o Malware is not the same as defective software, that is, software which
has a legitimate purpose but contains harmful bugs.
Patch
o A patch
is a downloadable executive file which takes these reports into account and attempts to incorporate all the fixes for these
known problems. A patch can resolve incompatibility problems, prevent crashes or improve the performance of a piece of software.
Personal IT Resources
o
is a Technical Staffing and recruiting company with
two major areas of focus for permanent placement, contract to hire, and technology consulting. The Information Technology
Group, specializing in the placement of Information Technology professionals; and the Engineering Group, specializing in the
placement of Hardware and Software engineering professionals with a emphasis in Electrical Engineering.
o
is represented by a well trained, highly qualified professional
staff of technical recruiters, each specializing in their field of expertise.
Purge
ü
To systematically and permanently remove old and
unneeded data. The term purge is stronger than delete. It is often possible to regain deleted objects by undeleting them, but purged objects are gone forever.
Remote access
In telecommunication, the term remote access has the following meanings:
- Pertaining
to communication with a data processing facility from a remote location or facility through a data link. One of the more common methods of providing this type of remote access is using a VPN.
- Remote desktop software
- A PABX service feature that allows a user at a remote location to access by telephone PABX features, such as access to Wide Area Telephone Service (WATS) lines.
- RemoteAccess is also the name of a DOS-based BBS software.
Remote access can refer to remote
desktop, remote terminal (like telnet) or any type of remote application (including remote browser).
Social Engineering
§ In
the realm of computers, the act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing
secure information. Social engineering is successful because its victims innately want to trust other people and are naturally
helpful. The victims of social engineering are tricked into releasing information that they do not realize will be used to
attack a computer network. For example, an employee in an enterprise may be tricked into revealing an employee identification number to someone who
is pretending to be someone he trusts or representing someone he trusts. While that employee number may not seem valuable
to the employee, which makes it easier for him to reveal the information in the first place, the social engineer can use that
employee number in conjunction with other information that has been gathered to get closer to finding a way into the enterprise’s
network.
Spoof
Spoof, spooves, spoofer or spoofing can refer to:
Strong Encryption
§ An ENCRYPTION ALGORITHM which cannot be broken within a
time frame that would enable the breaker to take advantage of the information that has been encrypted.
User ID
§ A User ID is the code used by a User to identify himself when he logs into a system and starts a Login Session. It is used by the system to uniquely identitfy this User. A User ID is one-half of a set of Credentials.
|