(split tun´&l-ing) (n.) The process of allowing a remote VPN user to access a public network, most commonly the Internet, at the same time that the user is allowed to access resources on the VPN. This method of network access enables the user to access remote devices, such as a networked printer, at the same time as accessing the public network.
An advantage of using split tunneling is that it alleviates bottlenecks and conserves bandwidth as Internet traffic does not have to pass through the VPN server. A disadvantage of this method is that it essentially renders the VPN vulnerable to attack as it is accessible through the public, non-secure network.
Short for spam blog, it’s a slang term used to describe blogs that are established only to promote affiliate Web sites in order to help those sites achieve a better search engine page ranking.
Short for “exploits”, sploitz is a slang term used to mean vulnerabilities in software that can be used by hackers.
(v.) To fool. In networking, the term is used to describe a variety of ways in which hardware and software can be fooled. IP spoofing, for example, involves trickery that makes a message appear as if it came from an authorized IP address.
A program that controls spooling — putting jobs on a queue and taking them off one at a time. Most operating systems come with one or more spoolers, such as a print spooler for spooling documents. In addition, some applications include spoolers. Many word processors, for example, include their own print spooler. A good print […]
Acronym for simultaneous peripheral operations on-line, spooling refers to putting jobs in a buffer, a special area in memory or on a disk where a device can access them when it is ready. Spooling is useful because devices access dataat different rates. The buffer provides a waiting station where data can rest while the slower […]