textual harassment
Using a mobile phone to repeatedly send unsolicited text messages to another person. The text messages may be a form of sexual harassment, abuse or bullying via text. Victims of textual harassment can request their cellphone provider to block texts (and calls) coming from a specific number, but with the capability to text from computer, the perpetrator could still send harassing text messages to the victim’s mobile phone.
Read Also:
- OpenStack
A project originally started by NASA and Rackspace for delivering a cloud computing and storage platform. Today, OpenStack is a global collaboration of developers and technologists producing an open source cloud computing platform for public and private clouds. The technology consists of a series of interrelated projects delivering various components for a cloud infrastructure solution. […]
- Chromium
Chromium refers to a pair of open-source projects that power the Google Chrome Web browser and Google Chrome OS. The Chromium project’s mission is to build an interface for users to experience the Web in a way that’s “faster, safer, and more stable than existing alternatives.” The Chromium OS project, on the other hand, aims […]
- Chromium OS
Chromium and Chromium OS refer to a pair of open-source projects that power the Google Chrome Web browser and Google Chrome OS, respectively. The Chromium OS project aims to develop a Web-focused operating system and computing experience that’s “fast, simple and secure,” while the Chromium project’s mission is to build an interface for users to […]
- Cat-6 (Category 6) Network Cabling
Short for Category 6, Cat-6 network cabling is used as the cabling infrastructure for 10BASE-T (Ethernet), 100BASE-TX (Fast Ethernet), 1000BASE-T (Gigabit Ethernet, or GbE) and 10GBASE-T (10-Gigabit Ethernet, or 10 GbE) networks. The Cat 6 standard provides performance of up to 250 MHz (500 MHz for the newer Cat 6a standard) and can be used […]
- Next Generation Firewall
A class of firewalls designed to filter network and Internet traffic based upon the applications or traffic types using specific ports. The application-specific granular security policies provided by Next Generation Firewalls help them detect application-specific attacks, giving them the potential to catch more malicious activity than more traditional firewalls. Next Generation Firewalls (NGFWs) blend the […]