News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About
The Broadband Guide
SG
search advanced
 Username:
 Password:
Register
 forgot your password?
eBay auction monitoring, bidding and sniping

List of netowrking, wireless, broadband, satellite, telephony, general computing and other technical terms used throughout the site.
 search
| All  | # | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
Term Description
UAC UAC (User Account Control) is a Windows Vista/2008 feature intended to provide aditional security by reducing user access.

It is intended to prevent access to core Windows components, prompting the user for access to perform any administrative tasks.

As a result from UAC, local administrative accounts run as standard user accounts by default, with their administrative priviledges disabled until they attempt to run an application or task that requires administrative token. When attempting to start such applications, the user is prompted to consent to running the application with elevated priviledges.

Applications can be configured to always run as elevated, or UAC can be reconfigured from from Control Panel > User Accounts > Turn User Account Control On or Off.

See Also: How to change Vista UAC settings
UAC UAC (User Account Control) is a Windows Vista/2008 feature intended to provide aditional security by reducing user access.

It is intended to prevent access to core Windows components, prompting the user for access to perform any administrative tasks.

As a result from UAC, local administrative accounts run as standard user accounts by default, with their administrative priviledges disabled until they attempt to run an application or task that requires administrative token. When attempting to start such applications, the user is prompted to consent to running the application with elevated priviledges.

Applications can be configured to always run as elevated, or UAC can be reconfigured from from Control Panel > User Accounts > Turn User Account Control On or Off.
UDP UDP (User Datagram Protocol, RFC 768) is a communications protocol, an alternative to TCP (Transmission Control Protocol), and uses the Internet Protocol (IP) to actually get a data units (datagrams) from one network node to another.

UDP does not provide the service of dividing a message into packets (unlike TCP) and reassembling it at the other end. Specifically, UDP doesn't provide sequencing of the packets that the data arrives in.

UDP is a stateless protocol, meaning it doesn't acknowledge that packets being sent have been received. For this reason, the UDP protocol is typically used for streaming media, where a lost packet should not stop the transmission of data, or for simple applications where very little processing power is a requirement. TFTP (Trivial File Transfer Protocol) uses UDP as well.
UMTS UMTS (Universal Mobile Telecommunications System) is a third-generation (3G) broadband, packet-based data transmission technology with data rates up to 2 Mbps. UMTS is based on the GSM communication standard.
Unicode Unicode is a 16 bit ISO 10646 character set. It can accommodate way more characters that ASCII, thus allowing for easier internationalization.
UPnP UPnP (Universal Plug and Play) is a standard that defines a connected environment, an automatic network of different, self-configuring devices, such as PCs, peripherals, wireless devices, and intelligent appliances. In a UPnP environment, all those devices would be able to configure themselves, aquire IP address automatically, announce their presense and location on the network (using HTTP), and be able to communicate using Internet and Web protocols.
upstream upstream (or upload, uplink) is a transmission from the end user to a server and downstream/download is a transmission toward the user. Data rate can differ in the downstream and upstream directions.
UTM UTM (Unified Threat Management) is a newer type of network security solution. It is an all-inclusive network gateway hardware that includes a firewall, intrusion prevention, gateway antivirus, anti-spam, VPN, content filtering, load balancing and reporting.
UTP UTP (Unshielded Twisted Pair) is a popular standard cable that consists of pairs of unshielded wires twisted areound each other. UTP cabling is commonly used for Ethernet networks and telephone connections because of its low cost and ease of use.
Term Description
| All  | # | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
top

exec. time: 0.00704 s
Copyright © 1998-2014 Speed Guide, Inc. All rights reserved.
Terms of Use | Privacy Policy