Bricking means a device has turned into a brick. It may be an electronic device worth a lot of money, but it is now as useful as a brick. A bricked device won’t power on […]
A wildcard refers to a character, normally an asterisk (*) or question mark (?), that can be substituted for zero or more characters in a string.
A trojan horse is a program that appears useful but is, in fact, malicious that tricks a user to install it. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, […]
A start-up sequence that starts the operating system of a computer when it is turned on.
Qi (pronounced “chee”) is a wireless charging technology used to wirelessly power electronic devices such as smartphones, tablets and wearable computing products.
Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
Click-jacking is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while clicking […]
Used by computers to act as a safety net to store deleted items. It temporarily stores files and folders before they are permanently deleted or restored to their original location.