Knowledgebase
Portal Home > Knowledgebase > T
Articles

In computing, ports are connection points. They may be physical connection points, as in the COM...

Certain applications use template files to pre-load default configurations settings. Microsoft...

2 to the 40th power (1,099,511,627,776) bytes. This is approximately 1 trillion bytes or 1024...

A time bomb is a malicious action triggered at a specific date or time. Also see: logic bomb.

The timestamp is the time of creation or last modification recorded on a file or another object....

TOM stands for Top of Memory. It is a design limitation at the 640kb mark on most PCs. Often the...

Means is when you download/share a file via the bittorrent protocol, that file is called a torrent.

A cookie that is shared between multiple pages for the sole use of tracking your usage on a...

A triggered event is an action built into a virus that is set off by a specific condition....

A Trojan horse is a malicious program that pretends to be a benign application. It purposefully...

Is a person who posts messages in order to provoke an angry response or to start trouble without...

TSR stands for Terminate and Stay Resident. TSR programs stay in memory after being executed....

Tunneling is a virus technique designed to prevent anti-virus applications from working...
Powered by WHMCompleteSolution