Portal Home > Knowledgebase > T


TCP/IP port
In computing, ports are connection points. They may be physical connection points, as in the COM...
Template
Certain applications use template files to pre-load default configurations settings. Microsoft...
Terabyte
2 to the 40th power (1,099,511,627,776) bytes. This is approximately 1 trillion bytes or 1024...
Text File
A file on your computer that uses only text and no formatting.
Tia
Is computer  slang for the phrase "Thanks in advance".
Time bomb
A time bomb is a malicious action triggered at a specific date or time. Also see: logic bomb.
Timestamp
The timestamp is the time of creation or last modification recorded on a file or another object....
TOM
TOM stands for Top of Memory. It is a design limitation at the 640kb mark on most PCs. Often the...
Topology
The physical layout of a network describing how the wires and devices are connected. 
Torrent
Means is when you download/share a file via the bittorrent protocol, that file is called a torrent.
Tracking Cookie
A cookie that is shared between multiple pages for the sole use of tracking your usage on a...
Triggered event
A triggered event is an action built into a virus that is set off by a specific condition....
Trojan
Is a piece of software that appears to be harmless but is actually harmful to your...
Trojan horse
A Trojan horse is a malicious program that pretends to be a benign application. It purposefully...
Troll
Is a person who posts messages in order to provoke an angry response or to start trouble without...
TSR
TSR stands for Terminate and Stay Resident. TSR programs stay in memory after being executed....
Tunneling
Tunneling is a virus technique designed to prevent anti-virus applications from working...

Powered by WHMCompleteSolution