SecPoint

Displaying 1-6 of 6 results

  • White Papers // Sep 2008

    What Is a Proxy Server?

    A proxy server, also known as a "Proxy" or "Application level gateway", is a computer that acts as a gateway between a local network (e.g., all the computers at one company or in one building) and a larger-scale network such as the Internet. Proxy servers provide increased performance and security....

    Provided By SecPoint

  • White Papers // Sep 2008

    What Is Grey Listing?

    Greylisting is a new method of blocking significant amounts of spam at the mailserver level, but without resorting to heavyweight statistical analysis or other heuristical (and error-prone) approaches. Consequently, implementations are fairly lightweight, and may even decrease network traffic and processor load on one's mailserver. The term Greylisting is meant...

    Provided By SecPoint

  • White Papers // Sep 2008

    What Is High Availability?

    High availability is a system design protocol and associated implementation that ensures a certain absolute degree of operational continuity during a given measurement period. Availability refers to the ability of the user community to access the system, whether to submit new work, update or alter existing work, or collect the...

    Provided By SecPoint

  • White Papers // Sep 2008

    What Is a Routing Table?

    A Routing Table is an electronic document that stores the routes to the various nodes in a computer network. The nodes may be any kind of electronic device connected to the network. The Routing Table is usually stored in a router or networked computer in the form of a database...

    Provided By SecPoint

  • White Papers // Sep 2008

    What Is SQL Injection?

    SQL injection is a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands inside...

    Provided By SecPoint

  • White Papers // Sep 2008

    What Is Cross Site Scripting (XSS)?

    High availability is a system design protocol and associated implementation that ensures a certain absolute degree of operational continuity during a given measurement period. Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form...

    Provided By SecPoint

  • White Papers // Sep 2008

    What Is a Proxy Server?

    A proxy server, also known as a "Proxy" or "Application level gateway", is a computer that acts as a gateway between a local network (e.g., all the computers at one company or in one building) and a larger-scale network such as the Internet. Proxy servers provide increased performance and security....

    Provided By SecPoint

  • White Papers // Sep 2008

    What Is Grey Listing?

    Greylisting is a new method of blocking significant amounts of spam at the mailserver level, but without resorting to heavyweight statistical analysis or other heuristical (and error-prone) approaches. Consequently, implementations are fairly lightweight, and may even decrease network traffic and processor load on one's mailserver. The term Greylisting is meant...

    Provided By SecPoint

  • White Papers // Sep 2008

    What Is High Availability?

    High availability is a system design protocol and associated implementation that ensures a certain absolute degree of operational continuity during a given measurement period. Availability refers to the ability of the user community to access the system, whether to submit new work, update or alter existing work, or collect the...

    Provided By SecPoint

  • White Papers // Sep 2008

    What Is a Routing Table?

    A Routing Table is an electronic document that stores the routes to the various nodes in a computer network. The nodes may be any kind of electronic device connected to the network. The Routing Table is usually stored in a router or networked computer in the form of a database...

    Provided By SecPoint

  • White Papers // Sep 2008

    What Is SQL Injection?

    SQL injection is a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands inside...

    Provided By SecPoint

  • White Papers // Sep 2008

    What Is Cross Site Scripting (XSS)?

    High availability is a system design protocol and associated implementation that ensures a certain absolute degree of operational continuity during a given measurement period. Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form...

    Provided By SecPoint