id
stringlengths
4
8
url
stringlengths
32
188
title
stringlengths
2
122
text
stringlengths
143
226k
1260
https://en.wikipedia.org/wiki/Advanced%20Encryption%20Standard
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a variant of the Rijndael block cipher developed by two Belgian cryptographers, Joa...
1368
https://en.wikipedia.org/wiki/Assembly%20language
Assembly language
In computer programming, assembly language (or assembler language), sometimes abbreviated asm, is any low-level programming language in which there is a very strong correspondence between the instructions in the language and the architecture's machine code instructions. Assembly language usually has one statement per ...
1921
https://en.wikipedia.org/wiki/Al-Qaeda
Al-Qaeda
Al-Qaeda (; , , translation: "the Base", "the Foundation", alternatively spelled al-Qaida and al-Qa'ida), officially known as Qaedat al-Jihad, is a multinational militant Sunni Islamic extremist network composed of Salafist jihadists. It was founded in 1988 by Osama bin Laden, Abdullah Azzam, and several other Arab vo...
1955
https://en.wikipedia.org/wiki/Adobe%20Inc.
Adobe Inc.
Adobe Inc. ( ), originally called Adobe Systems Incorporated, is an American multinational computer software company incorporated in Delaware and headquartered in San Jose, California. It has historically specialized in software for the creation and publication of a wide range of content, including graphics, photograp...
2112
https://en.wikipedia.org/wiki/Associative%20algebra
Associative algebra
In mathematics, an associative algebra A is an algebraic structure with compatible operations of addition, multiplication (assumed to be associative), and a scalar multiplication by elements in some field. The addition and multiplication operations together give A the structure of a ring; the addition and scalar multip...
2114
https://en.wikipedia.org/wiki/IBM%20AIX
IBM AIX
AIX (Advanced Interactive eXecutive, pronounced , “ay-eye-ex”) is a series of proprietary Unix operating systems developed and sold by IBM for several of its computer platforms. Originally released for the IBM RT PC RISC workstation in 1986, AIX has supported a wide variety of hardware platforms, including the IBM RS/6...
2807
https://en.wikipedia.org/wiki/Active%20Directory
Active Directory
Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Initially, Active Directory was used only for centralized domain management. However, Active Directory eventually became an umbrell...
2923
https://en.wikipedia.org/wiki/AIM%20%28software%29
AIM (software)
AIM (AOL Instant Messenger) was an instant messaging and presence computer program created by AOL, which used the proprietary OSCAR instant messaging protocol and the TOC protocol to allow registered users to communicate in real time. AIM was popular by the late 1990s, in United States and other countries, and was the...
3712
https://en.wikipedia.org/wiki/Bell%20Labs
Bell Labs
Nokia Bell Labs, originally named Bell Telephone Laboratories (1925–1984), then AT&T Bell Laboratories (1984–1996) and Bell Labs Innovations (1996–2007), is an American industrial research and scientific development company owned by Finnish company Nokia. With headquarters located in Murray Hill, New Jersey, the compan...
3742
https://en.wikipedia.org/wiki/Bluetooth
Bluetooth
Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the ISM bands, from 2.402 to 2.48GHz, and building personal area networks (PANs). It is mainly used as an alternative to wire connections, to exchange ...
3926
https://en.wikipedia.org/wiki/Blowfish%20%28disambiguation%29
Blowfish (disambiguation)
Blowfish are species of fish in the family Tetraodontidae. Blowfish may also refer to: Porcupinefish, belonging to the family Diodontidae Blowfish (cipher), an encryption algorithm Blowfish (company), an American erotic goods supplier The Blowfish, a satirical newspaper at Brandeis University Lexington County Bl...
3940
https://en.wikipedia.org/wiki/Blowfish%20%28cipher%29
Blowfish (cipher)
Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in many cipher suites and encryption products. Blowfish provides a good encryption rate in software, and no effective cryptanalysis of it has been found to date. However, the Advanced Encryption Standard (AES) now receives more at...
4524
https://en.wikipedia.org/wiki/Burroughs%20Corporation
Burroughs Corporation
The Burroughs Corporation was a major American manufacturer of business equipment. The company was founded in 1886 as the American Arithmometer Company. In 1986, it merged with Sperry UNIVAC to form Unisys. The company's history paralleled many of the major developments in computing. At its start, it produced mechanica...
4563
https://en.wikipedia.org/wiki/Battle%20of%20Jutland
Battle of Jutland
The Battle of Jutland (, the Battle of Skagerrak) was a naval battle fought between Britain's Royal Navy Grand Fleet, under Admiral Sir John Jellicoe, and the Imperial German Navy's High Seas Fleet, under Vice-Admiral Reinhard Scheer, during the First World War. The battle unfolded in extensive manoeuvring and three ma...
4594
https://en.wikipedia.org/wiki/Block%20cipher
Block cipher
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks. They are specified elementary components in the design of many cryptographic protocols and are widely used to the encryption of large amounts of data, including data exchange protocols. It uses blocks ...
5244
https://en.wikipedia.org/wiki/Cipher
Cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonym...
5300
https://en.wikipedia.org/wiki/Computer%20data%20storage
Computer data storage
Computer data storage is a technology consisting of computer components and recording media that are used to retain digital data. It is a core function and fundamental component of computers. The central processing unit (CPU) of a computer is what manipulates data by performing computations. In practice, almost all co...
5323
https://en.wikipedia.org/wiki/Computer%20science
Computer science
Fundamental areas of computer science include the study of computer programming languages (top left), the design and analysis of algorithms (top right), building intelligent systems (bottom left), and electrical hardware (bottom right). Computer science involves the study of or the practice of computation, automation,...
5715
https://en.wikipedia.org/wiki/Cryptanalysis
Cryptanalysis
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cry...
5749
https://en.wikipedia.org/wiki/Key%20size
Key size
In cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), since the security of all algorithm...
6115
https://en.wikipedia.org/wiki/P%20versus%20NP%20problem
P versus NP problem
The P versus NP problem is a major unsolved problem in computer science. It asks whether every problem whose solution can be quickly verified can also be solved quickly. The informal term quickly, used above, means the existence of an algorithm solving the task that runs in polynomial time, such that the time to compl...
6295
https://en.wikipedia.org/wiki/Chaos%20theory
Chaos theory
Chaos theory is an interdisciplinary scientific theory and branch of mathematics focused on underlying patterns and deterministic laws highly sensitive to initial conditions in dynamical systems that were thought to have completely random states of disorder and irregularities. Chaos theory states that within the appare...
6321
https://en.wikipedia.org/wiki/Channel%204
Channel 4
Channel 4 is a British free-to-air public-service television network. Its headquarters are in London, with a national headquarters in Leeds and creative hubs in Glasgow and Bristol. The channel was established to provide a fourth television service to the United Kingdom in addition to the licence-funded BBC One and B...
6834
https://en.wikipedia.org/wiki/List%20of%20computer%20scientists
List of computer scientists
This is a list of computer scientists, people who do work in computer science, in particular researchers and authors. Some persons notable as programmers are included here because they work in research as well as program. A few of these people pre-date the invention of the digital computer; they are now regarded as co...
7088
https://en.wikipedia.org/wiki/List%20of%20cryptographers
List of cryptographers
This is a list of cryptographers. Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. Pre twentieth century Al-Khalil ibn Ahmad al-Farahidi: wrote a (now lost) book on cryptography titled the "Book of Cryptographic Messages". Al-Kindi, 9t...
7110
https://en.wikipedia.org/wiki/CSS%20%28disambiguation%29
CSS (disambiguation)
CSS, or Cascading Style Sheets, is a language used to describe the style of document presentations in web development. CSS may also refer to: Computing and telecommunications Central Structure Store book, in the PHIGS 3D API Chirp spread spectrum, a modulation concept, part of the standard IEEE 802.15.4aCSS Proprieta...
7331
https://en.wikipedia.org/wiki/Cellular%20digital%20packet%20data
Cellular digital packet data
Cellular Digital Packet Data (CDPD) was a wide-area mobile data service which used unused bandwidth normally used by AMPS mobile phones between 800 and 900 MHz to transfer data. Speeds up to 19.2 kbit/s were possible, though real world speeds seldom reached higher than 9.6 kbit/s. The service was discontinued in conjun...
7398
https://en.wikipedia.org/wiki/Computer%20security
Computer security
Computer security, cybersecurity, or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field i...
7829
https://en.wikipedia.org/wiki/Chaos%20Computer%20Club
Chaos Computer Club
The Chaos Computer Club (CCC) is Europe's largest association of hackers with registered members. Founded in 1981, the association is incorporated as an eingetragener Verein in Germany, with local chapters (called Erfa-Kreise) in various cities in Germany and the surrounding countries, particularly where there are Ger...
7903
https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman%20key%20exchange
Diffie–Hellman key exchange
Diffie–Hellman key exchange is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman. DH is one of the earliest practical examples of public key exchange implemented within t...
7978
https://en.wikipedia.org/wiki/Data%20Encryption%20Standard
Data Encryption Standard
The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for applications, it has been highly influential in the advancement of cryptography. Developed in the early 1970s at IBM and based on an earlier design by ...
8271
https://en.wikipedia.org/wiki/Digital%20television
Digital television
Digital television (DTV) is the transmission of television signals using digital encoding, in contrast to the earlier analog television technology which used analog signals. At the time of its development it was considered an innovative advancement and represented the first significant evolution in television technolog...
8339
https://en.wikipedia.org/wiki/Domain%20Name%20System
Domain Name System
The Domain Name System (DNS) is the hierarchical and decentralized naming system used to identify computers, services, and other resources reachable through the Internet or other Internet Protocol (IP) networks. The resource records contained in the DNS associate domain names with other forms of information. These are ...
8377
https://en.wikipedia.org/wiki/Database
Database
In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases spans formal techniques and practical considerations including data modeling, ef...
8484
https://en.wikipedia.org/wiki/Deus%20Ex%20%28video%20game%29
Deus Ex (video game)
Deus Ex is a 2000 action role-playing game developed by Ion Storm and published by Eidos Interactive. Set in a cyberpunk-themed dystopian world in the year 2052, the game follows JC Denton, an agent of the fictional agency United Nations Anti-Terrorist Coalition (UNATCO), who is given superhuman abilities by nanotechno...
8492
https://en.wikipedia.org/wiki/Discrete%20mathematics
Discrete mathematics
Discrete mathematics is the study of mathematical structures that can be considered "discrete" (in a way analogous to discrete variables, having a one-to-one correspondence with the set of natural numbers) rather than "continuous" (analogously to continuous functions). Objects studied in discrete mathematics include in...
8536
https://en.wikipedia.org/wiki/Differential%20cryptanalysis
Differential cryptanalysis
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in information input can affect the resultant difference at the output. In the case of a block ciphe...
8674
https://en.wikipedia.org/wiki/Digital%20enhanced%20cordless%20telecommunications
Digital enhanced cordless telecommunications
Digital enhanced cordless telecommunications (Digital European cordless telecommunications), usually known by the acronym DECT, is a standard primarily used for creating cordless telephone systems. It originated in Europe, where it is the common standard, replacing earlier cordless phone standards, such as 900 MHz CT1 ...
8735
https://en.wikipedia.org/wiki/BIND
BIND
BIND () is a suite of software for interacting with the Domain Name System (DNS). Its most prominent component, named (pronounced name-dee: , short for name daemon), performs both of the main DNS server roles, acting as an authoritative name server for DNS zones and as a recursive resolver in the network. As of 2015, i...
8844
https://en.wikipedia.org/wiki/Digital%20cinema
Digital cinema
Digital cinema refers to adoption of digital technology within the film industry to distribute or project motion pictures as opposed to the historical use of reels of motion picture film, such as 35 mm film. Whereas film reels have to be shipped to movie theaters, a digital movie can be distributed to cinemas in a numb...
9256
https://en.wikipedia.org/wiki/Enigma%20machine
Enigma machine
The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the German military. The Enigma machine was considered so secure that it was used ...
9569
https://en.wikipedia.org/wiki/Endomorphism
Endomorphism
In mathematics, an endomorphism is a morphism from a mathematical object to itself. An endomorphism that is also an isomorphism is an automorphism. For example, an endomorphism of a vector space is a linear map , and an endomorphism of a group is a group homomorphism . In general, we can talk about endomorphisms in ...
9611
https://en.wikipedia.org/wiki/E-commerce
E-commerce
E-commerce (electronic commerce) is the activity of electronically buying or selling of products on online services or over the Internet. E-commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data inter...
9738
https://en.wikipedia.org/wiki/Email
Email
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic (digital) version of, or counterpart to, mail, at a time when "mail" meant only physical mail (hence e- + mail). Email later became a ubiquitous (very widely ...
9966
https://en.wikipedia.org/wiki/Elliptic-curve%20cryptography
Elliptic-curve cryptography
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide equivalent security. Elliptic curves are applicable for key agreement, di...
10294
https://en.wikipedia.org/wiki/Encryption
Encryption
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. En...
10384
https://en.wikipedia.org/wiki/Boeing%20E-3%20Sentry
Boeing E-3 Sentry
The Boeing E-3 Sentry is an American airborne early warning and control (AEW&C) aircraft developed by Boeing. E-3s are commonly known as AWACS (Airborne Warning and Control System). Derived from the Boeing 707 airliner, it provides all-weather surveillance, command, control, and communications, and is used by the Unit...
10772
https://en.wikipedia.org/wiki/Fair%20use
Fair use
Fair use is a doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to balance the interests of copyright holders with the public interest in the wider distribution and...
10969
https://en.wikipedia.org/wiki/Field-programmable%20gate%20array
Field-programmable gate array
A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by a customer or a designer after manufacturinghence the term field-programmable. The FPGA configuration is generally specified using a hardware description language (HDL), similar to that used for an application-specific integrat...
10997
https://en.wikipedia.org/wiki/Freenet
Freenet
Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship. Both Freenet and some of its associated tools wer...
11026
https://en.wikipedia.org/wiki/List%20of%20programmers
List of programmers
This is a list of programmers notable for their contributions to software, either as original author or architect, or for later additions. All entries must already have associated articles. A Michael Abrash – program optimization and x86 assembly language Scott Adams – one of earliest developers of CP/M and DOS games...
11527
https://en.wikipedia.org/wiki/Fundamental%20theorem%20on%20homomorphisms
Fundamental theorem on homomorphisms
In abstract algebra, the fundamental theorem on homomorphisms, also known as the fundamental homomorphism theorem, or the first isomorphism theorem, relates the structure of two objects between which a homomorphism is given, and of the kernel and image of the homomorphism. The homomorphism theorem is used to prove the...
11866
https://en.wikipedia.org/wiki/Global%20Positioning%20System
Global Positioning System
The Global Positioning System (GPS), originally Navstar GPS, is a satellite-based radionavigation system owned by the United States government and operated by the United States Space Force. It is one of the global navigation satellite systems (GNSS) that provides geolocation and time information to a GPS receiver anywh...
12808
https://en.wikipedia.org/wiki/GSM
GSM
The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation (2G) digital cellular networks used by mobile devices such as mobile phones and tablets. It was first deployed in Finland in December 19...
12884
https://en.wikipedia.org/wiki/GCHQ
GCHQ
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Based at "The Doughnut" in the suburbs of Cheltenham, GCHQ is the ...
13564
https://en.wikipedia.org/wiki/Homomorphism
Homomorphism
In algebra, a homomorphism is a structure-preserving map between two algebraic structures of the same type (such as two groups, two rings, or two vector spaces). The word homomorphism comes from the Ancient Greek language: () meaning "same" and () meaning "form" or "shape". However, the word was apparently introduced...
13586
https://en.wikipedia.org/wiki/HTTPS
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer...
13636
https://en.wikipedia.org/wiki/History%20of%20computing%20hardware
History of computing hardware
The history of computing hardware covers the developments from early simple devices to aid calculation to modern day computers. Before the 20th century, most calculations were done by humans. Early mechanical tools to help humans with digital calculations, like the abacus, were referred to as calculating machines or ca...
13777
https://en.wikipedia.org/wiki/Hard%20disk%20drive
Hard disk drive
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage and one or more rigid rapidly rotating platters coated with magnetic material. The platters are paired with magnetic heads, usually arranged on a movin...
13919
https://en.wikipedia.org/wiki/Hezbollah
Hezbollah
Hezbollah (; , lit. "Party of Allah" or "Party of God", also transliterated Hizbullah or Hizballah, among others) is a Lebanese Shia Islamist political party and militant group, led by its Secretary-General Hassan Nasrallah since 1992. Hezbollah's paramilitary wing is the Jihad Council, and its political wing is the L...
14539
https://en.wikipedia.org/wiki/Internet
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a ...
14722
https://en.wikipedia.org/wiki/Irssi
Irssi
Irssi ( ) is an IRC client program for Linux, FreeBSD, macOS and Microsoft Windows. It was originally written by Timo Sirainen, and released under the terms of the GNU GPL-2.0-or-later in January 1999. Features Irssi is written in the C programming language and in normal operation uses a text-mode user interface. Acc...
14730
https://en.wikipedia.org/wiki/Internet%20Relay%20Chat
Internet Relay Chat
Internet Relay Chat (IRC) is a text-based chat (instant messaging) system. IRC is designed for group communication in discussion forums, called channels, but also allows one-on-one communication via private messages as well as chat and data transfer, including file sharing. Internet Relay Chat is implemented as an ap...
14739
https://en.wikipedia.org/wiki/IEEE%20802.11
IEEE 802.11
IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer communication. The standard and amendments provide the basis for wireless network p...
14742
https://en.wikipedia.org/wiki/Internet%20Standard
Internet Standard
An Internet Standard in computer network engineering refers to the normative specification of a technology that is appropriate for the Internet. Internet Standards allow interoperation of hardware and software from different sources which allows the internet to function. They are the lingua franca of worldwide communic...
15036
https://en.wikipedia.org/wiki/Information%20security
Information security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disrupt...
15076
https://en.wikipedia.org/wiki/International%20Data%20Encryption%20Algorithm
International Data Encryption Algorithm
In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991. The algorithm was intended as a replacement for the Data Encryption...
15154
https://en.wikipedia.org/wiki/IBM%203270
IBM 3270
The IBM 3270 is a family of block oriented display and printer computer terminals introduced by IBM in 1971 and normally used to communicate with IBM mainframes. The 3270 was the successor to the IBM 2260 display terminal. Due to the text color on the original models, these terminals are informally known as green scree...
16476
https://en.wikipedia.org/wiki/John%20Ashcroft
John Ashcroft
John David Ashcroft (born May 9, 1942) is an American lawyer, lobbyist, songwriter and former politician who served as the 79th U.S. Attorney General in the George W. Bush Administration, Senator from Missouri, and Governor of Missouri. He later founded The Ashcroft Group, a Washington D.C. lobbying firm. Ashcroft pre...
16830
https://en.wikipedia.org/wiki/Keyboard%20technology
Keyboard technology
The technology of computer keyboards includes many elements. Among the more important of these is the switch technology that they use. Computer alphanumeric keyboards typically have 80 to 110 durable switches, generally one for each key. The choice of switch technology affects key response (the positive feedback that a...
16947
https://en.wikipedia.org/wiki/Kerberos%20%28protocol%29
Kerberos (protocol)
Kerberos () is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model, and it provides mutual authentication—both the user an...
17530
https://en.wikipedia.org/wiki/Lattice
Lattice
Lattice may refer to: Arts and design Latticework, an ornamental criss-crossed framework, an arrangement of crossing laths or other thin strips of material Lattice (music), an organized grid model of pitch ratios Lattice (pastry), an ornamental pattern of crossing strips of pastry Companies Lattice Engines, a tec...
18031
https://en.wikipedia.org/wiki/Leon%20Battista%20Alberti
Leon Battista Alberti
Leon Battista Alberti (; 14 February 1406 – 25 April 1472) was an Italian Renaissance humanist author, artist, architect, poet, priest, linguist, philosopher, and cryptographer; he epitomised the nature of those identified now as polymaths. He is considered the founder of Western cryptography, a claim he shares with Jo...
18209
https://en.wikipedia.org/wiki/Lossless%20compression
Lossless compression
Lossless compression is a class of data compression that allows the original data to be perfectly reconstructed from the compressed data. By contrast, lossy compression permits reconstruction only of an approximation of the original data, though usually with greatly improved compression rates (and therefore reduced me...
18529
https://en.wikipedia.org/wiki/Lynx%20%28web%20browser%29
Lynx (web browser)
Lynx is a customizable text-based web browser for use on cursor-addressable character cell terminals. , it is the oldest web browser still being maintained, having started in 1992. History Lynx was a product of the Distributed Computing Group within Academic Computing Services of the University of Kansas, and was init...
18562
https://en.wikipedia.org/wiki/Leet
Leet
Leet (or "1337"), also known as eleet or leetspeak, is a system of modified spellings used primarily on the Internet. It often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance. Additionally, it modifies certain words based on a system of suffixes and a...
18568
https://en.wikipedia.org/wiki/List%20of%20algorithms
List of algorithms
The following is a list of algorithms along with one-line descriptions for each. Automated planning Combinatorial algorithms General combinatorial algorithms Brent's algorithm: finds a cycle in function value iterations using only two iterators Floyd's cycle-finding algorithm: finds a cycle in function value itera...
19001
https://en.wikipedia.org/wiki/Microsoft
Microsoft
Microsoft Corporation is an American multinational technology corporation which produces computer software, consumer electronics, personal computers, and related services. Its best-known software products are the Microsoft Windows line of operating systems, the Microsoft Office suite, and the Internet Explorer and Edge...
20087
https://en.wikipedia.org/wiki/Modular%20arithmetic
Modular arithmetic
In mathematics, modular arithmetic is a system of arithmetic for integers, where numbers "wrap around" when reaching a certain value, called the modulus. The modern approach to modular arithmetic was developed by Carl Friedrich Gauss in his book Disquisitiones Arithmeticae, published in 1801. A familiar use of modular...
20268
https://en.wikipedia.org/wiki/Microsoft%20Excel
Microsoft Excel
Microsoft Excel is a spreadsheet developed by Microsoft for Windows, macOS, Android and iOS. It features calculation or computation capabilities, graphing tools, pivot tables, and a macro programming language called Visual Basic for Applications (VBA). Excel forms part of the Microsoft Office suite of software. Featur...
20287
https://en.wikipedia.org/wiki/Microsoft%20Word
Microsoft Word
Microsoft Word is a word processing software developed by Microsoft. It was first released on October 25, 1983, under the name Multi-Tool Word for Xenix systems. Subsequent versions were later written for several other platforms including IBM PCs running DOS (1983), Apple Macintosh running the Classic Mac OS (1985), AT...
20288
https://en.wikipedia.org/wiki/Microsoft%20Office
Microsoft Office
Microsoft Office, or simply Office, is a family of client software, server software, and services developed by Microsoft. It was first announced by Bill Gates on August 1, 1988, at COMDEX in Las Vegas. Initially a marketing term for an office suite (bundled set of productivity applications), the first version of Office...
20407
https://en.wikipedia.org/wiki/Multicast
Multicast
In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously. Multicast can be one-to-many or many-to-many distribution. Multicast should not be confused with physical layer point-to-multipoint communication. Group communication may ei...
20640
https://en.wikipedia.org/wiki/MacOS
MacOS
macOS (; previously Mac OS X and later OS X) is a proprietary graphical operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and laptop computers it is the second most widely used desktop OS, after Microsoft Windows ...
20901
https://en.wikipedia.org/wiki/Malware
Malware
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes with the user's ...
20935
https://en.wikipedia.org/wiki/Microsoft%20Access
Microsoft Access
Microsoft Access is a database management system (DBMS) from Microsoft that combines the relational Access Database Engine (ACE) with a graphical user interface and software-development tools. It is a member of the Microsoft 365 suite of applications, included in the Professional and higher editions or sold separately....
21527
https://en.wikipedia.org/wiki/Number%20theory
Number theory
Number theory (or arithmetic or higher arithmetic in older usage) is a branch of pure mathematics devoted primarily to the study of the integers and integer-valued functions. German mathematician Carl Friedrich Gauss (1777–1855) said, "Mathematics is the queen of the sciences—and number theory is the queen of mathemati...
21861
https://en.wikipedia.org/wiki/Cryptonomicon
Cryptonomicon
Cryptonomicon is a 1999 novel by American author Neal Stephenson, set in two different time periods. One group of characters are World War II-era Allied codebreakers and tactical-deception operatives affiliated with the Government Code and Cypher School at Bletchley Park (UK), and disillusioned Axis military and intell...
21863
https://en.wikipedia.org/wiki/Netscape%20Navigator
Netscape Navigator
Netscape Navigator was a proprietary web browser, and the original browser of the Netscape line, from versions 1 to 4.08, and 9.x. It was the flagship product of the Netscape Communications Corp and was the dominant web browser in terms of usage share in the 1990s, but by around 2003 its use had almost disappeared. Thi...
21918
https://en.wikipedia.org/wiki/Normal%20subgroup
Normal subgroup
In abstract algebra, a normal subgroup (also known as an invariant subgroup or self-conjugate subgroup) is a subgroup that is invariant under conjugation by members of the group of which it is a part. In other words, a subgroup of the group is normal in if and only if for all and The usual notation for this relat...
21939
https://en.wikipedia.org/wiki/National%20Security%20Agency
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligenc...
22210
https://en.wikipedia.org/wiki/One-time%20pad
One-time pad
In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is no smaller than the message being sent. In this technique, a plaintext is paired with a random secret key (also referred to as a one-time pad). Then, each bit or charact...
22676
https://en.wikipedia.org/wiki/Oxfordian%20theory%20of%20Shakespeare%20authorship
Oxfordian theory of Shakespeare authorship
The Oxfordian theory of Shakespeare authorship contends that Edward de Vere, 17th Earl of Oxford, wrote the plays and poems traditionally attributed to William Shakespeare. Though literary scholars reject all alternative authorship candidates, including Oxford, interest in the Oxfordian theory continues. Since the 1920...
22679
https://en.wikipedia.org/wiki/Office%20of%20Strategic%20Services
Office of Strategic Services
The Office of Strategic Services (OSS) was the intelligence agency of the United States during World War II. The OSS was formed as an agency of the Joint Chiefs of Staff (JCS) to coordinate espionage activities behind enemy lines for all branches of the United States Armed Forces. Other OSS functions included the use o...
22739
https://en.wikipedia.org/wiki/Obfuscation%20%28software%29
Obfuscation (software)
In software development, obfuscation is the deliberate act of creating source or machine code that is difficult for humans to understand. Like obfuscation in natural language, it may use needlessly roundabout expressions to compose statements. Programmers may deliberately obfuscate code to conceal its purpose (security...
22747
https://en.wikipedia.org/wiki/OSI%20model
OSI model
The Open Systems Interconnection model (OSI model) is a conceptual model that characterises and standardises the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with s...
23062
https://en.wikipedia.org/wiki/Post%20Office%20Protocol
Post Office Protocol
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP version 3 (POP3) is the version in common use. Purpose The Post Office Protocol provides access via an Internet Protocol (IP) network for a user client appli...
23080
https://en.wikipedia.org/wiki/Pretty%20Good%20Privacy
Pretty Good Privacy
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Phil Zimmermann devel...
23486
https://en.wikipedia.org/wiki/Phil%20Zimmermann
Phil Zimmermann
Philip R. Zimmermann (born 1954) is an American computer scientist and cryptographer. He is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. He is also known for his work in VoIP encryption protocols, notably ZRTP and Zfone. Zimmermann is co-founder and Chief Scient...
23511
https://en.wikipedia.org/wiki/Point-to-Point%20Protocol
Point-to-Point Protocol
In computer networking, Point-to-Point Protocol (PPP) is a data link layer (layer 2) communication protocol between two routers directly without any host or any other networking in between. It can provide connection authentication, transmission encryption, and data compression. PPP is used over many types of physical ...