R-S

 < Day Day Up > 



RAM

Random Access Memory (see also DRAM, SDRAM). A data-storage device for which the order of access to different locations does not affect the speed of access. This is in contrast to magnetic disk or magnetic tape where it is much quicker to access data sequentially because accessing a nonsequential location requires physical movement of the storage medium rather than just electronic switching. The most common form of RAM in use today is built from semiconductor integrated circuits, which can either be static (SRAM) or dynamic (DRAM).

Random text displayer

Have visitors see random messages you have saved in a text file, such as famous quotes or announcements. Generally, the visitor will see a different message every time they visit the site.

Raw stats/graphic stats/advanced stats

You have access to a raw access log so you can analyze your site’s usage with any program you desire. Graphical stats are a detailed graphical and tabular view of your Web site’s traffic grouped by weeks, days, and hours in an easy to read format.

Real Audio/Video

A client–server based system where both the browser and server must have Real Audio/Video components to provide streaming media to visitors at your Web site without waiting for the clip to download.

Retro-virus

A retro-virus is a virus that waits until all possible back-up media are also infected, so that it is not possible to restore the system to an uninfected state.

Revolution in Military Affairs (RMA)

Current term for the transformations driven by the proliferation of information technology (IT) as tools for optimizing military operations and weapons of military utility. The current RMA is an instance of a military technical revolution (MTR).

Right-click

To right-click an item is to point to it with the screen pointer, and then quickly press and release the right mouse button once.

Risk

With specific regard to data or information systems—accidental or unpredictable exposure of information, or violation of operations integrity due to the malfunction of hardware or incomplete or incorrect software design.

RMA

Acronym for revolution in military affairs.

ROM

Read-only memory. A type of data-storage device that is manufactured with fixed contents. The term is most often applied to semiconductor-integrated circuit memories. ROM is inherently nonvolatile storage—it retains its contents even when the power is switched off, in contrast to RAM. It is used in part for storage of the lowest level bootstrap software (firmware) in a computer.

SA

Acronym for situation awareness.

Scavenge/scavenging

Searching through object residue (discarded disks, tapes, or paper) to acquire sensitive data without authorization.

Scripts

Scripts are programs written to run with your Web pages and perform a specific task in response to visitor actions such as clicking a button. For example, a Perl script counts the visits to this page, and a JavaScript script makes the buttons change colors when you put your mouse pointer over them. Scripts can be written in Perl, Java, JavaScript, VBScript, and a dozen other programming languages.

SCSI

Stands for small computer system interface. A standard that allows multiple devices to be connected in daisy-chain fashion.

SDRAM

Stands for synchronous dynamic random access memory (see also DRAM). SDRAM incorporates new features that make it faster than standard DRAM and EDO memory.

Search engine

A CGI script that allows visitors to perform keyword searches of a Web site.

Second-wave war(fare)

A synonym for industrial warfare—the mode of warfare characteristic of nation states as they developed during the Enlightenment, through the Industrial Revolution, and through the 20th century.

Sector

The tracks on a disk are divided into sectors. Clusters contains from 1 to 64 sectors.

Secure server (SSL)

One method of ensuring that information entered through your Web site is protected. Information submitted via a secure form is sent to the server in encrypted mode. This is most commonly used for credit card transactions.

Security

Measures taken by a military unit, an activity or installation to protect itself against all acts designed to, or which may, impair its effectiveness.

Security audit

A search through a computer system for security problems and vulnerabilities.

Security breach

A violation of controls of a particular information system such that information assets or system components are unduly exposed.

Security classification

A category to which national security information and material is assigned to denote the degree of damage that unauthorized disclosure would cause to national defense or foreign relations of the United States and to denote the degree of protection required.

Select

To select an item is to identify to the computer one or more files or folders that you wish to do something with. This is usually done by pointing to an item with the screen pointer, and then quickly pressing and releasing the left mouse button once.

Sensor-to-shooter

A descriptive phrase employed to connote the cumulative feed-forward of data and information through an operational military system, from initial acquisition of novel data elements (via the sensors) through to the element(s) effecting instrumental response as needed (the shooter’). A loose descriptor for the scope of processing for intrasystemic functions to obtain advantage in a theater of operations.

Server

A server is a special computer designed for the Internet or another network, usually far more powerful than a regular desktop computer, that had a full-time direct connection to the Internet. Some servers even have two or more processors working together. Servers run special software called “Web server software,” which enables them to receive requests and deliver files to other computers across the Internet.

Server side includes (SSI)

Allows the server to understand and respond to special page commands. As an example, if you had a footer you wanted on all your pages that may change from time to time, you can create a text file with the desired footer and place it in your document. On each page you put a simple include to read the file and place it at the bottom of the desired pages. Then changing the footer on all your pages would be just as simple as changing the one text file.

Session hijacking

Taking over an authorized user’s terminal session, either physcially when the user leaves his or her terminal unattended, or electronically when the intruder carefully connects to a just-disconnected communications line.

Shared situation awareness (SSA)

The collective perception, comprehension, and projection of environmental elements among a set of actors.

Shopping cart

Keeps track of what your customers have ordered on-line as they add and remove items. When a customer is ready to check-out, the program tallies the order for processing and takes their credit card and other information.

SIGINT

Acronym for signals intelligence.

Signal

As applied to electronics, any transmitted electrical impulse.

Signal security (SIGSEC)

A generic term that includes both communications security and electronic security.

Signals intelligence (SIGINT)

A category of intelligence comprising—either individually or in combination—all communications intelligence, electronics intelligence, and foreign instrumentation signals intelligence, however transmitted.

SIGSEC

Acronym for signal security.

Simple counter

Graphical count of visitors to your Web site, which appears on your Web page.

Site submission

Submits your site information to a database of over 1600 search engines, link engines, and directories.

Situation awareness (SA)

Sometimes termed “situational awareness.” The perception of the elements in the environment within a volume of time and space, the comprehension of their meaning, and the projection of their status in the near future. This term is broadly used to denote the state of awareness that a subject (operator; pilot) has in the course of a task at a given point in time. As such, it connotes a degree of orientation to those circumstances at that point in time— particularly those that are germane to the task itself. The term is also (more loosely) used to connote such a state of awareness or orientation with respect to multiple actors and/or organizational units. As such, the notion of situation awareness maps straightforwardly onto the “Orientation” phase of the OODA Loop.

Slot

A physical connector on a motherboard to hold an expansion card, SIMM, DIMM, or a processor card in place.

Sniff / sniffing

The act of surreptitiously monitoring data streams so as to intercept and capture exploitable information.

Sniffer

A tool used to intercept potentially exploitable data from the traffic on a network. A program to capture data across a computer network. Used by hackers to capture user-ID names and passwords. Software tool that audits and identifies network traffic packets.

Social engineering

A term for personal (social) tactics employed in support of attempts to achieve unauthorized access to a computer/information system. This is something of a catch-all category for any tricks used to obtain the intended access or to obtain information critical to achieving that access.

Socket

A receptacle, usually on a motherboard, that processors or chips can be inserted into.

SOS

Acronym for system of systems.

Spam

The act of bombarding a target (system, Usenet news group, set of e-mail addresses) with sufficient volume of data (or a volume of sufficiently massive data items) such that degradation or even denial of service is achieved. This term is also pejoratively applied to describe the perceived harassment of receiving profligately broadcast data (junk e-mail advertising). To crash a program by overrunning a fixed-site buffer with excessively large input data. Also, to cause a person or newsgroup to be flooded with irrelevant or inappropriate messages.

Spectrum management

Planning, coordinating, and managing joint use of the electromagnetic spectrum through operational, engineering, and administrative procedures, with the objective of enabling electronic systems to perform their functions in the intended environment without causing or suffering unacceptable interference.

System registry

The system configuration files used by Windows 95, 98, and NT to store settings about user preferences, installed software, hardware and drivers, and other settings required for Windows to run correctly. The system updates the registry every time you add new hardware or a new program to your system. When the registry becomes “broken,” it can cause serious system problems.



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net