Read More
February 16, 2017

broadband

Broadband in telecommunications is a term used to refer to any technology that utilizes a "broad" band of frequencies to transmit data
 
Read More
July 22, 2017

dark web

The dark web is a portion of the deep web that's inaccessible without specialized software. The most infamous software used to access the dark web is Tor.
 
Read More
July 22, 2017

deep web

The deep web is a portion of the internet that isn’t indexed by search engines. This can include anything like access to your e-mail account, access to your bank account, access to your school’s academic journals, access to your workplace’s internal intranet, or simply just a website that’s accessible by its IP only.

One thing that’s important to note is that the deep web should not be confused with the dark web. While technically the dark web is a part of the deep web, the deep web isn’t as secretive nor does it have the same negative connotation that the dark web implies.

 
Read More
July 15, 2017

VPN

Virtual Private Network
 
Read More
July 21, 2017

LMAO

Laughing My Ass Off
 
Read More
July 21, 2017

ROFL

Rolling On the Floor Laughing
 
Read More
July 22, 2017

SFTP

SFTP, or SSH File Transfer Protocol, is a communications protocol that provides secure file transfer capabilities. SFTP is commonly used for sharing files in a corporate setting, web development and programming.

In rare cases, SFTP may also refer to Simple File Transfer Protocol. This is an unsecured file transfer protocol which is now largely unused.

 
Read More
July 22, 2017

ransomware

Ransomware is a type of malicious software, or malware, designed to infect a computer and hold its data ransom until a sum of money is paid for it to be unlocked. This is typically accomplished by encrypting the victim’s files so that it can’t be decrypted without the key which only the attacker has access to. Payment is then rendered via a cryptocurrency such as Bitcoin so that the transaction cannot be traced by law enforcement.

Generally, ransomware infects a computer by entering a users system through files that users think are legitimate. Once the files are executed, the ransomware is deployed with it. The ransomware can then either stay dormant or can [...]

 
Read More
July 24, 2017

adware

Advertising Malware
 
Read More
July 24, 2017

kill switch

Kill switch, when used in the context of VPNs, is a feature which automatically "kills" or stops any network activity once the VPN connection is lost.
Featured Articles
 
SanDisk Extreme Portable SSD Review
 
Samsung 970 EVO Review (500GB)
 
OnePlus 5T Review
 
AVADirect X370 Quiet Gaming PC Review
 
Beyerdynamic Custom Game Review
Latest Guides
 
 
 
 
 
Join us on Discord