-
attack surface
https://en.wikipedia.org/wiki/Attack_surface The attack surface of a software environment is the sum of the different points (for “attack vectors“) where an unauthorized user (the “attacker”) can try to enter data to or extract data from an environment
-
attack vector
https://en.wikipedia.org/wiki/Attack_vector attack vector is a specific path, method, or scenario that can be exploited to break into an IT system.
-
“instantaneous”
O.E.D. 1. a. Occurring or operating in an instant; done, completed, or reaching completion without any perceptible lapse of time.
-
bounce message
A system generated email sent by return (usually instant, which is ironic) to say (usually in an obscure coded way) why an email has not been delivered. Failure of delivery does NOT guarantee one of these and even when received the recipient often (usually) fails to pass it on to those who need to know…
-
bytes
https://en.wikipedia.org/wiki/Byte#Multiple-byte_units a Bit is on or off, a nibble is 4 bits, a byte is 8 bits, and APPROXIMATELY (that means roughly so 1,024 = 1,000) a kilobyte is 1,000 bytes, a megabyte is 1,000 kilobytes a gigabyte is 1,000 megabytes a terabyte is 1,000 gigabytes
-
DKIM
https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail Email authentication – block spammers using your email address, especially for phishing.
-
Ed
This is where as Editor I have inserted my own text into text quoted from somewhere else. I always give the links to the source of my quoted text, so we can see if it has changed and so we can each validate and verify it for ourselves, which is crucially important for all internet…
-
Eisenhower Method
https://en.wikipedia.org/wiki/Time_management#The_Eisenhower_Method Splits time demands in to Urgent & important, Important not urgent, unimportant urgent, unimportant not urgent.