text encryption terminal

  • 1Abkürzungen/Computer — Dies ist eine Liste technischer Abkürzungen, die im IT Bereich verwendet werden. A [nach oben] AA Antialiasing AAA authentication, authorization and accounting, siehe Triple A System AAC Advanced Audio Coding AACS …

    Deutsch Wikipedia

  • 2Liste der Abkürzungen (Computer) — Dies ist eine Liste technischer Abkürzungen, die im IT Bereich verwendet werden. A [nach oben] AA Antialiasing AAA authentication, authorization and accounting, siehe Triple A System AAC Advanced Audio Coding AACS …

    Deutsch Wikipedia

  • 3Comparison of instant messaging clients — The following tables compare general and technical information for a number of instant messaging clients. Please see the individual products articles for further information. This article is not all inclusive or necessarily up to date. External… …

    Wikipedia

  • 4Comparison of remote desktop software — This page is a comparison of remote desktop software available for various platforms. Contents 1 Remote desktop software 1.1 General information 1.2 Operating system support 1.3 Featu …

    Wikipedia

  • 5List of Microsoft Windows components — The following is a list of Microsoft Windows components. Contents 1 Configuration and maintenance 2 User interface 3 Applications and utilities 4 Windows Server components …

    Wikipedia

  • 6ROT13 — replaces each letter by its partner 13 characters further along the alphabet. For example, HELLO becomes URYYB (or, rev …

    Wikipedia

  • 7Email client — Mozilla Thunderbird email client user interface on a GNU/Linux operating system An email client, email reader, or more formally mail user agent (MUA), is a computer program used to manage a user s email. The term can refer to any system capable… …

    Wikipedia

  • 8Liste von Abkürzungen (Computer) — Dies ist eine Liste technischer Abkürzungen, die im IT Bereich verwendet werden. Inhaltsverzeichnis A B C D E F G H I J K L M N O P Q R S T U V W X Y Z siehe auch: Liste von Dateiendu …

    Deutsch Wikipedia

  • 9Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… …

    Wikipedia

  • 10Comparison of file managers — The following tables compare general and technical information for a number of notable file managers. Contents 1 General information 2 Operating system support 2.1 Cross platform file managers 2.2 …

    Wikipedia