A state in which a message that has been broadcast across a network results in even more responses, and each response results in still more responses in a snowball effect. A severe broadcast storm can block all other network traffic, resulting in a network meltdown. Broadcast storms can usually be prevented by carefully configuring a network to block illegal broadcast messages.
(n.) Short for bridge router and pronounced BROW-ter, a device that functions as both a router and a bridge. A brouter understands how to route specific types of packets, such as TCP/IP packets. Any other packets it receives are simply forwarded to other network(s) connected to the device (this is the bridge function).
The term brownfield was originally used in construction and development to reference land that at some point was occupied by a permanent structure. In a brownfield project the structure would need to be demolished or renovated. Today, the term brownfield project is used in many industries, including software development, to mean to start a project […]
(1) In database systems, browse means to view data. Many database systems support a special browse mode , in which you can flip through fields and records quickly. Usually, you cannot modify data while you are in browse mode. (2) In object-oriented programming languages, browse means to examine data structures. (3) To view formatted documents. […]
- Web Browser (Browser)
Short for Web browser, a browser is a software application used to locate, retrieve and display content on the World Wide Web, including Web pages, images, video and other files. As a client/server model, the browser is the client run on a computer that contacts the Web server and requests information. The Web server sends […]
- browser hijacker
A specific type of spyware that will allow a hacker or malicious perpetrator to spy on the infected computer’s Internet browsing activity. Using a browser hijacker the person responsible for the spyware can deliver pop-up ads, reset the browser homepage, or direct the browser to Web sites the victim would not normally visit. See The […]