Search
All categories
Results 61 - 81 of about 578
  • Data tampering attacks

    Most web application attacks involving soliciting a website with manually entered data to generate an unexpected context. Web application parameters The HTTP protocol, a communication protocol on the web, makes it possible to convey ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Quality Organization

    Quality Organization Establishing a quality procedure is a comprehensive business project that requires the participation of all employees. Therefore, it is necessary to define a "quality organization" that fits into and hinges on the ... Read more

    Quality
    November 12, 2012 at 03:20 PM
  • Team

    Jeff PILLOU Director of publication. Jeff PILLOU is the founder of CCM.net. Email : jf@ccm.net Tel : (+33) 1 47 79 51 03 ... Read more

    About Us
    January 10, 2017 at 11:33 AM
  • Front Office and Back Office

    Front Office/Back Office The terms Front Office and Back Office are generally used to describe the parts of the company (or of its information system) that are dedicated, respectively, to the direct relationship with the client and proper ... Read more

    e-Business
    October 16, 2008 at 09:43 AM
  • Substitution cipher

    Substitution cipher Substitution cipher involves replacing one or more entities (generally letters) in a message with one or more other entities. There are several types of substitution cryptosystems: Monoalphabetic substitution involves ... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Types of computers

    Types of computers There are several families of computers, depending on their format: Mainframes, computers which a great deal of computing power, enormous input-output capabilities and high level of reliability. Mainframes are used by ... Read more

    Computer
    November 1, 2012 at 04:13 PM
  • Rules for proper email use

    Netiquette Netiquette (a contraction of the words "Net" and "etiquette") refers to the set of rules governing correct behavior on the Internet, in order to respect others and be respected in turn. They serve as guidelines for civility and ... Read more

    Email
    October 16, 2008 at 09:43 AM
  • Declaring a style sheet (CSS)

    Declaring a style sheet Style sheets are not directly integrated into the W3C's HTML recommendations. For this reason, you need to include elements in the HTML code indicating both the type of document, meaning the version of the HTML and ... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • Computer screen or monitor

    Introduction to computer monitors A monitor (or screen) is a computer display unit. There are generally said to be two families of monitors: Cathode-ray tube monitors (or CRT for short), which are used with most desktop computers. They are ... Read more

    Computer
    November 1, 2012 at 04:17 PM
  • MIME (Multipurpose Internet Mail Extensions)

    Introduction to MIME MIME (Multipurpose Internet Mail Extensions) is a standard which was proposed by Bell Communications in 1991 in order to expand upon the limited capabilities of email, and in particular to allow documents (such as ... Read more

    Email
    October 16, 2008 at 09:43 AM
  • CD, CD audio and CD-ROM

    The Compact Disc was invented by Sony and Philips in 1981 in order to serve as a high-quality compact audio storage device which allowed for direct access to digital sound tracks. It was officially launched in October 1982. In 1984, the ... Read more

    Computer
    October 7, 2012 at 02:35 PM
  • E-mail scams - Fund transfer scams

    Scams A "scam" is a fraudulent practice of African origin that involves extorting funds from internet users by enticing them with a sum of money and promising them a share of it. The use of scams originated in Nigeria, which has also given ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • TCP session hijacking

    TCP session hijacking "TCP session hijacking" is a technique that involves intercepting a TCP session initiated between two machines in order to hijack it. In that the authentication check is performed only when opening the session, a ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • MS DOS Files and directories

    Files in MS DOS In a computers data is stored in files. When you run a program, MS-DOS processes the data stored in the file and passes it to the system. In MS-DOS a file can be any size, however the file name is more restricted, it can ... Read more

    MS Dos
    October 16, 2008 at 09:43 AM
  • Terms of Use for CCM.net

    Preface These terms of use have been written in order to inform users of the site of its conditions of use, in particular for using of communications services (such as the bulletin board) which let users the world over, ... Read more

    Terms of Use
    June 13, 2016 at 11:49 AM
  • Information security officer (ISO)

    Information security officer (ISO) An ISO (information security officer) is in charge of setting and a company's security policy. He/she also plays a critical role in informing, advising, and alerting the general management on matters ... Read more

    IT professions
    October 16, 2008 at 09:43 AM
  • Multichannel audio (5.1, 6.1, 7.1)

    Multichannel audio The term "multichannel audio" refers to the use of multiple audio tracks to reconstruct sound on a multi-speaker sound system. Two digits separated by a decimal point (2.1, 5.1, 6.1, 7.1, etc.) are used to classify the ... Read more

    Audio
    October 16, 2008 at 09:43 AM
  • Formatting - Formatting a hard drive

    Before trying to understand formatting, you first need to understand how a hard drive works. Many people do not distinguish low-level formatting (also called physical formatting) from high-level formatting (also called logical formatting). ... Read more

    Computer: maintenance
    October 16, 2008 at 09:43 AM
  • Information systems governance (IT Governance)

    The Concept of Governance The term "Governance" specifies the ability of an organization to be able to control and regulate its own operation so as to avoid conflicts of interest related to the division between beneficiaries (shareholders) ... Read more

    Information System
    October 16, 2008 at 09:43 AM
  • Smileys (emoticons)

    Why smileys? When typing words on the Internet, it's not always easy to convey feelings, emotions, or concepts like humor to the people you're communicating with. Here's a simple tip for getting the right message across: Use ASCII ... Read more

    World Wide Web
    October 16, 2008 at 09:43 AM