An older programming interface developed by Microsoft to reuse components which facilitate the provision of content (e. g. videos and games) on websites. The new Microsoft «Edge» browser does not support ActiveX, constituting an unofficial Microsoft announcement that this technology is now obsolete.
This is a method for encrypting data. AES can for instance be used to encrypt transmissions inside a WLAN (WPA2) network. This encrypts anything exchanged between the WLAN router and a device connected wirelessly.
Wi-Fi Protected Access 2, Wireless Local Area Network
An intrinsically legal way of financing «free» software. This is either implemented via ad banners inside the actual software, or via the installation of additional third party software.
Is a character coding containing 95 printable and 33 non-printable characters. The printable characters include the Latin alphabet (A-Z, a-z), the ten Arabic numerals (0-9) as well as some punctuation marks (sentence symbols, word symbols) and other special characters.
The word «Applet» is made up from the terms «application» and «snippet» and either describes a Java program running inside a browser or a computer program which cannot be run as a stand-alone application.
This is the process of checking the purported identity of a person or a computer based on a certain characteristic (e. g. password, chip card or fingerprint).
The allocation of permissions. Based on permissions, authorisation is granted to access resources (e. g. files, software, payments, etc.) after successful identification and authentication.
Participate in one of our «eBanking – but secure!» courses (in GERMAN, FRENCH and ITALIAN language only) and learn how the «5 steps for your security» can protect you when e-banking!
information / registration
Copyright © 2019 – All rights reserved. Lucerne School of Information Technologies