TCB

Short for trusted computing base. TCB refers to the totality of protection mechanisms (hardware, firmware and software) that provide a secure computing environment. The TCB includes everything that must be trusted — access control, authorization and...

Computer maintenance tips

With the amount of information available for download on the Internet, it’s easy to quickly fill up your valuable hard drive space and turn your computer into a sluggish, unresponsive monster. Keeping your hard drive clean is essential to the high performance...

Remote attack

Any malicious attack that targets any computer other than the computer the attacker is currently logged on to. For example, the attacker can log on to a system but actually attack any computer or server on the same network.

Service Level Agreement

An SLA is a formally negotiated agreement between two parties. It is a contract that exists between customers and their service provider, client or between service providers. It records the common understanding about services, priorities, responsibilities, guarantee,...

Rogue peer

A rogue peer is an end-user computer—usually a laptop—that has both bridging and wireless enabled. Since the basic functions of an access point are bridging and wireless access, any laptop that has these capabilities presents a similar vulnerability or worse. The...

Kerusakan pada Printer InkJet

Perkembangan industri printer pada hari-hari terakhir memaksa kita untuk lebih serius mempelajari karakter-karakter printer terbaru sehingga gangguan-gangguan pada penggunaan printer yang diakibatkan oleh modifikasi ataupun hal-hal yang lain dapat kita cermati dan...