Passive Marker

Augmented Reality involves superimposing digital images into real-time images of the real world. This means being able to view the real world through an AR device and have the digital images move...

Penetration Testing Explained

Penetration testing, often abbreviated as pen testing, is a simulated cyber attack conducted on a system or network to identify vulnerabilities and weaknesses that could be exploited by malicious...

Persistent Storage Explained

Persistent storage, also called non-volatile storage, refers to any data storage device that retains its data even after power is turned off. Common examples of such devices include: ...

Phishing Explained

Phishing is a type of social engineering attack which attempts to lure you into divulging your personal or sensitive information using misleading and deceptive methods. Phishing can be carried out...

Post-Quantum Cryptography (PQC) Explained

Post-Quantum Cryptography (PQC) is a future-proofing strategy for securing information in the age of quantum computers. Today's widely used encryption relies on complex mathematical problems...

Private Cloud Explained

Private cloud is a cloud computing model where infrastructure – servers, storage, networking – is dedicated to a single organisation. Unlike public clouds, where resources are shared...

Private Cloud Storage Explained

Private cloud storage is an approach in cloud storage wherein a dedicated cloud infrastructure is assigned to only one organisation, which can be located inside the company’s own premises or...

Private Email Server Explained

A private email server is an email system that’s offered via a private server for better functionality, privacy and security. Most public email providers like Google and Hotmail use their own...

Privilege Creep Explained

In an IT organisation, each employee has their own set of privileges which they need to perform their duty. One such privilege may be the right to access a particular system resource like file...

Public Cloud Explained

Public cloud refers to a model where on-demand computing resources are delivered over the Internet. These resources, which can include servers, storage, databases, and networking components, are...

© Asia Online Publishing Group Sdn Bhd 2024
Powered by