Create an account
a great source of information, but is also the biggest source of malware (malicious software)
software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior
Hash Encryption Algorithm
encryption algorithm that is one-way, which means that it encrypts data, but the data cannot be decrypted
Trusted Platform Module (TPM)
a part of the motherboard in your computer and is used to store encryption keys and certificates
mode in which Internet Explorer runs in a limited state, in which user files cannot be modified
Network Access Protection (NAP)
a computer authorization system for networks that prevents unhealthy computers from accessing the network
a collection of settings to control password characteristics such as length and complexity; included in the Account Policies category
are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together