Verb:To get your Steam,World of Warcraft,Runescape,Myspace,Facebook or even email hijacked by giving a password away during chatting or even in an email
Posts made by Ernesto
Stands for Fiber Optic Service. FiOS is a data communications service provided by Verizon that uses fiber optic cables to transfer data. FiOS is called a Fiber to the Premises, or FTTP service, since it brings fiber optic data transmission to residential homes as well as businesses. Since fiber optic technology sends data via pulses of light, it is the fastest method of transferring data.
While FiOS is currently used primarily for Internet access, it can also be used for digital cable and voice over IP (VoIP) services. For this reason, FiOS is considered to be a potential competitor to both cable and Internet Service Providers.
A file extension (or simply extension) is the suffix at the end of a filename that indicates what type of file it is. For example, in the filename myreport.txt, the .TXT is the file extension. It indicates the file is a text document. Some other examples include .DOCX, which is used for Microsoft Word documents, and .PSD, which is the standard file extension for Photoshop documents.
While most file extensions are three characters in length, they can be as short as one character or longer than twenty characters. Sometimes long file extensions are used to more clearly identify the file type. For example, the .TAX2015 file extension is used to identify TurboTax 2015 tax returns and the .DESKTHEMEPACK extension identifies Windows 8 desktop themes. The file extension determines which program is used to open the file as well as what icon should be displayed for the file. It also helps you see what kind of file a certain document is by just looking at the filename.
Both Windows and Mac OS X allow you to manually change file extensions, which may also change the program the computer uses to open the file. While this might work for some files, it may also cause the file to not open at all. For example, if you change a file with a .txt extension to a .doc extension, Microsoft Word may still open it. However, if you change a .txt file to a .psd file, Photoshop will not recognize or open the file.
Since there are tens of thousands of file types, there are also tens of thousands of file extensions. While it may not be possible to remember all of them, it is helpful to learn some of the more common ones, such as .JPG, .GIF, .MP3, .ZIP, .HTML, and others. For a list of common file extensions and their associated file types, visit FileInfo.coms Common File Types page.
Email, short for electronic mail, is one of the most widely used features of the Internet, along with the web. It allows you to send and receive messages to and from anyone with an email address, anywhere in the world.
Email uses multiple protocols within the TCP/IP suite. For example, SMTP is used to send messages, while the POP or IMAP protocols are used to retrieve messages from a mail server. When you configure an email account, you must define your email address, password, and the mail servers used to send and receive messages. Fortunately, most webmail services configure your account automatically, so you only need to enter your email address and password. However, if you use an email client like Microsoft Outlook or Apple Mail, you may need to manually configure each account. Besides the email address and password, you may also have to enter the incoming and outgoing mail servers and enter the correct port numbers for each one.
The original email standard only supported plain text messages. Eventually, email evolved to support rich text with custom formatting. Today, email supports HTML, which allows emails to be formatted the same way as websites. HTML email messages can include images, links, and CSS layouts. You can also send files or email attachments along with messages. Most mail servers allow you to send multiple attachments with each message, but they limit the total size. In the early days of email, attachments were typically limited to one megabyte, but now many mail servers support email attachments that are 20 megabytes in size or more.
When composing an email message, it is important to use good netiquette. For example, you should always include a subject that summarizes the topic of the email. It is also helpful to begin each message with the recipients name and end the message with your name or signature. A typical signature includes your name, email address, and/or website URL. A professional signature may include your company name and title as well. Most email programs allow you to save multiple signatures, which you can insert at the bottom of an email.
If you want to send an email to multiple recipients, you can simply add each email address to the To field. However, if the email is primarily intended for one person, you should place the additional addresses in the CC (carbon copy) field. If you are sending an email to multiple people that dont know each other, it is best to use the Bcc (blind carbon copy) field. This hides the email addresses of each recipient, which helps prevent spam.
NOTE: Email was originally written e-mail, but is now more commonly written as email without the dash.
Cryptography is the science of protecting information by transforming it into a secure format. This process, called encryption, has been used for centuries to prevent handwritten messages from being read by unintended recipients. Today, cryptography is used to protect digital data. It is a division of computer science that focuses on transforming data into formats that cannot be recognized by unauthorized users.
An example of basic cryptography is a encrypted message in which letters are replaced with other characters. To decode the encrypted contents, you would need a grid or table that defines how the letters are transposed. For example, the translation grid below could be used to decode 1234125678906 as techterms.com.
The above table is also called a cipher. Ciphers can be simple translation codes, such as the example above, or complex algorithms. While simple codes sufficed for encoding handwritten notes, computers can easily break, or figure out, these types of codes. Because computers can process billions of calculations per second, they can even break complex algorithms in a matter of seconds. Therefore, modern cryptography involves developing encryption methods that are difficult for even supercomputers to break.
Stands for Cathode Ray Tube. CRT is the technology used in traditional computer monitors and televisions. The image on a CRT display is created by firing electrons from the back of the tube to phosphors located towards the front of the display. Once the electrons hit the phosphors, they light up and are projected on the screen. The color you see on the screen is produced by a blend of red, blue, and green light, often referred to as RGB.
The stream of electrons is guiding by magnetic charges, which is why you may get interference with unshielded speakers or other magnetic devices that are placed close to a CRT monitor. Flat screen or LCD displays dont have this problem, since they dont require a magnetic charge. LCD monitors also dont use a tube, which is what enables them to be much thinner than CRT monitors. While CRT displays are still used by graphics professionals because of their vibrant and accurate color, LCD displays now nearly match the quality of CRT monitors. Therefore, flat screen displays are well on their way to replacing CRT monitors in both the consumer and professional markets.
Stands for Cost Per 1,000 Impressions, and is used in online advertising. CPM defines the cost an advertiser pays for 1,000 impressions of an advertisement, such as a banner ad or other promotion. An impression is counted each time an advertisement is shown.
While some advertisers pay publishers an amount based strictly on impressions, most advertisers pay for individual clicks or leads generated from their advertisements. Therefore, in Web advertising, it may be more effective to measure pay per click (PPC) or pay per lead (PPL) rates. Either way, the advertisers goal is to generate as many leads as possible by keeping the rates as low as possible.
Web publishers also use the CPM to measure the revenue per 1,000 impressions. While technically this should be revenue per 1,000 impressions, or RPM, the terms CPM and RPM are often used interchangeably from the publishers perspective.