The Security Guide Security Guide RSS Feed


Internet and Data Security Knowledgebase

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 


WEP Wireless legacy encryption. The group that conceived WEP made errors when implementing it, and it is now broken.
WPA WiFi Protected Access: The one and only useful setting that you have to worry about with wireless is using strong encryption.
This is called WPA or WPA-PSK on your router configuration screen, and all you need to do is assign a hard to guess password. Using a phrase is even more secure than just one word.
Because WPA was well implemented, it would take someone with the computing power of the NSA several years to break just one encrypted connection.
In contrast, if you use WEP, you can download an application that will crack it in 1 minute.
WSUS Microsoft Windows Server Update Services. WSUS is a no-charge, add-in component for Windows 2000 and Windows Server 2003 that can be used to automate the process of distributing software updates.
WSUS enables an organization to implement a Windows Update├╗like service within the corporate firewall structure.
The WSUS server downloads updates from Microsoft Update, and client computers are configured to obtain their updates automatically from the WSUS server instead of from Microsoft Update.
Web 2.0 For Internet users, Web 2.0 is the second generation web that emphasizes collaboration, participation, and interactivity.
For web application developers, Web 2.0 is also synonymous with technologies that underpin modern, dynamic, rich client web applications. These technologies include AJAX, RuleWorks, DHTML, Flash, and Oracle APEX.
White hat A non-criminal hacker, who uses their skills legally.
Wi-Fi A standard for wireless networks that ensures interoperability between different manufacturers.
802.11 networks come in three different variants: a, b and g. 802.11b is the most common while a and g are much faster. Usually cards capable of faster speeds are backwardly-compatible to the b standard.
Worms Programs characterised by having the ability to replicate themselves and viruses are similar except that they achieve this by adding their code onto third party software.
Once a virus or worm has infected a computer, it would typically infect other programs (in the case of viruses) and other computers.

© RuleWorks - All Rights Reserved - Policy -