First developed by Check Point Software in 1996 as a protocol specification for integration with anti-virus servers. Check Point first utilized its Content Vectoring Protocol (CVP) in its FireWall-1 Version 3.0 and then developed CVP into an API specification.
The CVP API defines an asynchronous interface to server applications that perform file content validation. An important feature of this is scanning files for viruses or harmful applets as they pass through firewalls. The CVP defines a client/server relationship that enables different firewall systems to share a common content validation server. In essence, the one content validation server collects from multiple firewalls the incoming files that have been flagged for inspection.
- Control key
A key on PC keyboards labeled Ctrl. You use the Control key in the same way that you use the Shift key — keeping it pressed down while pressing another character. The result is a control key combination , which can have different meanings depending on which program is running. On Macintoshes, the Control key […]
- Control key combination
A command issued by pressing a keyboard character in conjunction with the Control key. Manuals usually represent control key commands with the prefix CTRL- or CNTL-. For example, CTRL-N means the Control key and N pressed at the same time. Sometimes a control character is represented by a caret (for example, ^N is the same […]
An Internet telephone (VoIP) tool built into Netscape Navigator 3.0. Like NetMeeting, which is included with Microsoft’s Internet Explorer, CoolTalk supports audio conferencing, a whiteboard, and a chat tool.
A blog network that consists of blogs written by leading commentators, analysts and observers in their respective field. Blog categories on Corante include technology, law, business, management, science and culture. See “The History of Blogging” in
- Courier font
A common monospaced (fixed-pitch) font. This sentence is in Courier font. Most printers support the Courier font.