Glossary

1 MINUTES

Common Internet File System / Server Message Block (CIFS SMB)

by Iwan Price-Evans on Glossary • December 12, 2019
What is Common Internet File System / Server Message Block (CIFS SMB)? Common Internet File System / Server Message Block is a protocol for sharing files, services and resources over a network.
Read More →
1 MINUTES

What is Cross-Site Scripting?

by Iwan Price-Evans on Security • December 12, 2019
What is Cross-Site Scripting? Cross-site scripting refers to the injection of malicious code into a trusted website for execution on client devices.
Read More →
1 MINUTES

What is Asymmetric Deployment?

by Iwan Price-Evans on Glossary • December 12, 2019
What is Asymmetric Deployment? An asymmetric deployment describes a network with a network gateway device at a single central location (usually within a data centre) to provide web traffic acceleration to connecting clients.
Read More →
1 MINUTES

What is an Application Delivery Controller (ADC)?

by Iwan Price-Evans on ADC • September 4, 2019
What is an Application Delivery Controller (ADC)? An application delivery controller (ADC) is a software application or hardware appliance that incorporates several tools, technologies and techniques for providing, controlling and monitoring access to web application servers.
Read More →
1 MINUTES

What is Application Acceleration?

by Iwan Price-Evans on Web Acceleration • September 4, 2019
What is Application Acceleration? Application acceleration is the optimization of web application traffic flow for increased backend server performance and faster content delivery to web application clients.
Read More →
1 MINUTES

Active-Passive vs Active-Active Redundancy

by Iwan Price-Evans on High Availability • September 2, 2019
What is Active-Passive Redundancy? Active-Passive Redundancy is a high availability mode of operation whereby two or more identical instances of the same network device or appliance operate simultaneously but only instances marked as active serve client requests.
Read More →
1 MINUTES

What is an Application Firewall?

by Iwan Price-Evans on Security • August 21, 2019
What is an Application Firewall? An application firewall inspects traffic destined for application servers to detect malicious or suspicious application requests. It can be configured to monitor, log and/or deny such requests.
Read More →
1 MINUTES

What is Buffer Overflow?

by Iwan Price-Evans on Security • August 16, 2019
What is Buffer Overflow? Buffer overflow is a state that occurs when a computer program writes more data into a temporary storage location (buffer) than the capacity of the location.
Read More →
1 MINUTES

What is Anti-Phishing?

by Iwan Price-Evans on Security • August 16, 2019
What is Anti-Phishing? Anti-phishing is a network security strategy for guarding against the unauthorized extraction of user identity information.
Read More →