In information technology, a darknet describes a peer-to-peer overlay network whose participants sometimes establish their connections with each other manually and which is shielded from the general Internet by special measures. This concept is in contrast to conventional peer-to-peer networks, in which connections to the clients of strangers are usually initiated automatically and … [Read more...]
Usernames on the Internet: Legal Implications
A username or user ID is a name that a user can use to log on to a computer, website, or program. On the Internet, in conjunction with a secure password, it is usually used to log in to a user account and requires prior registration. In the case of services without a fixed user account, e.g. Internet Relay Chat, the nickname may be the same as the username. With the many online services, the … [Read more...]
What We Mean by the Phrase Virtual World
A virtual world is the representation and simultaneous perception of the totality of a world of objects of apparent objectivity in three-dimensional space in a computer-generated, interactive virtual environment in real time. They are not synonymous with virtual reality and augmented reality, although the technologies can be used. The user accesses a computer-simulated world consisting of … [Read more...]
Pros and Cons of Internet Access via Satellite
Internet via satellite is a satellite-based Internet access. Geostationary satellites are often used for this purpose, but satellite constellations in low or medium Earth orbits (LEO or MEO) are also used. Basically, a distinction must be made between two types of satellite connection. In 2-way satellite connection the outward and return channels (downstream and upstream) are established via a … [Read more...]
What is Transaction Processing
In computer science, a transaction is a sequence of program steps that are regarded as a logical unit because they leave the data stock in a consistent state after error-free and complete execution. Therefore, a transaction is particularly required to be executed either completely and error-free or not at all. Transactions are mostly used in database systems. Failed transactions must be … [Read more...]
What is PCI DSS Compliance
The Payment Card Industry Data Security Standard, commonly abbreviated to PCI or PCI-DSS, is a set of rules in payment transactions that relates to the processing of credit card transactions and is supported by all major credit card organizations. The current version of PCI-DSS is: V4.0 from March 2022. Merchants and service providers who store, transmit, or process credit card transactions … [Read more...]
Information Technology Networking in Society
The concept of networking in the general sense is synonymous with the process of docking to a network, the process of integrating oneself into a network, or the process of establishing new relationships with a network. In the context of information technology or telecommunications, the provision, activation and use of news channels in a network by actors who have come together to communicate … [Read more...]
What is Identity Theft
Identity theft (also known as identity fraud) is the misuse of personal data (the identity) of a natural person by third parties. Although the term "identity theft" is used very often, it is not exactly "theft" because in a typical theft something is taken away from the entitled person, so that he or she no longer has it himself. In the case of identity theft, however, the entitled person can … [Read more...]
Problems of Search Engine
Web search engines have their origins in information retrieval systems. The data is obtained by the web crawler of the respective search engine, e.g. Googlebot. About a third of all searches on the Internet are related to people and their activities. Search Behavior Search queries can be categorized in a number of ways. This classification plays a role in online marketing and … [Read more...]
How Search Engine Works
A search engine is a program used to search documents stored on a computer or computer network, or the World Wide Web. After creating a search query, often by typing a search term, a search engine provides a list of references to potentially relevant documents, usually presented with a title and a short excerpt of the respective document. Various search methods are used. The essential components … [Read more...]
What is Meant by Doxing?
Doxing is internet-based collection and subsequent publication of personal data, typically with malicious intent against the data subjects. To some extent, this also goes hand in hand with the identification of anonymous persons. The reasons for doxing can vary in nature, including vigilante justice, public shaming, and harassment. People affected by doxing are often exposed to follow-up attacks, … [Read more...]