Engineering
A Token Ring is a local area network in which computers are connected to each other using ring or star topology. A token is...
BUSCADOR
A DeadLock is the situation where a two programs are sharing the same resources and both of them are waiting for each other to...
A flash memory is a storage memory which is nonvolatile and does not have any moving parts. It is called as «Flash» because the...
Clickjacking is an exploit which changes the original intention of a click able content on a website with an unintended activity. This activity can...
OCTAVE(Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a security framework which finds the level of risk in the system of an organization for...
A Token Ring is a local area network in which computers are connected to each other using ring or star topology. A token is...
Blacksurfing is saving energy while surfing on the web. This can be done using inverted palette, by applying black background and white text. The...
Processor modes controls how the processor sees and manipulates the system memory and the tasks that use it. There are three different modes of...
A Kernel panic is a error which is generated by the operating system due to some kind of malfunction. This term is mostly used...