Please wait while we load your page...
 

Announcements

Dictionary :: Letter B

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z





Results 1 to 5 of 6

Bandwidth

Bandwidth is the measurement of data that is sent from your server down to the visitors computer. If you have a lot of visitors and they all download large files from you, then you will need a great amount of bandwidth. Many webmasters do not plan for the future, and inadvertently have their web sites shut down in the middle of the month because their web site was much more popular than they ever expected. To prevent this from happening to you, carefully measure your bandwidth usage and plan ahead!

Last Revised: 2015-07-01

Basic Authentication

Basic Authentication is a widely used protocol for simple username/password authentication. For example, when your web browser prompts you for credentials to login for access. This type authentication is typically implemented per .htaccess file (located in the folder that is being password protected). For example:

AuthUserFile /location/of/.htpasswd
AuthName "Members"
AuthType Basic

<limit GET PUT POST>
require valid-user
</limit>


You can store passwords in a MySQL database instead of a file (.htpasswd):

AuthMySQLEnable On
AuthMySQLHost localhost
AuthMySQLUser sqlusername
AuthMySQLPassword sqlpassword
AuthMySQLDB sqldatabasename
AuthMySQLUserTable sqltablename
AuthMySQLNameField username
AuthMySQLPasswordField password
AuthMySQLNoPasswd Off
AuthMySQLPwEncryption md5
AuthMySQLAuthoritative On
AuthBasicAuthoritative Off
AuthName "Members"
AuthType Basic

<limit GET PUT POST>
require valid-user
</limit>


We provide a tool, PassProtector, to generate all the necessary codes needed to password protect a directory via .htaccess.

Last Revised: 2015-07-01

BCC

BCC stands for "Blind Carbon Copy" which says: send a copy to another email address, but (unlike CC) don't indicate to the recipient that you also sent this copy to another person.

Last Revised: 2015-10-15

Blog

A blog (short for weblog) is a discussion or informational site published on the World Wide Web and consisting of discrete entries (posts) typically displayed in reverse chronological order (the most recent post appears first).

Last Revised: 2015-09-08

Browser

The software application (program) you use to view or browse the web. You're more than likely reading this through one right now. They translate, or interpret HTML code into the page you see. The most common are FireFox, Google Chrome, Microsoft Internet Explorer (IE), Opera, and Safari.

Last Revised: 2015-07-01

Brute Force Attack

In cryptography, a brute-force attack, or exhaustive key search, is a cryptanalytic attack that can, in theory, be used against any encrypted data (except for data encrypted in an information-theoretically secure manner). Such an attack might be utilized when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier. It consists of systematically checking all possible keys until the correct key is found. In the worst case, this would involve traversing the entire search space.

The key length used in the cipher determines the practical feasibility of performing a brute-force attack, with longer keys exponentially more difficult to crack than shorter ones. A cipher with a key length of N bits can be broken in a worst-case time proportional to 2N and an average time of half that. Brute-force attacks can be made less effective by obfuscating the data to be encoded, something that makes it more difficult for an attacker to recognize when he/she has cracked the code. One of the measures of the strength of an encryption system is how long it would theoretically take an attacker to mount a successful brute-force attack against it.

Brute-force attacks are an application of brute-force search, the general problem-solving technique of enumerating all candidates and checking each one.

Last Revised: 2015-07-01

Live Chat Not Available