Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
l
- LSP (Label Switched Path) Description: LSP (Label Switched Path) is a fundamental concept in MPLS (Multiprotocol Label Switching) networks, enabling efficient data(...) Read more
- L2VPN (Layer 2 Virtual Private Network) Description: L2VPN (Layer 2 Virtual Private Network) is a type of VPN that operates at the data link layer of the OSI model, allowing the(...) Read more
- Link Policy Description: The Link Policy in the context of BGP (Border Gateway Protocol) refers to a set of rules and criteria that determine how network(...) Read more
- Link Aggregation Control Protocol (LACP) Description: The Link Aggregation Control Protocol (LACP) is an IEEE standard that allows multiple network connections to be combined into a(...) Read more
- Link Reliability Description: Link reliability is a crucial measure in the field of computer networks, especially in routing protocols. It refers to the(...) Read more
- Link Identification Description: Link Identification in the context of routing protocols refers to the process by which the state and characteristics of a network(...) Read more
- Logic Bomb Description: The Logic Bomb is a piece of malicious code that is triggered by a specific event or condition. This type of malware is(...) Read more
- Lurking Description: Lurking is the act of secretly observing a network or system without actively participating. This concept is fundamental in the(...) Read more
- Logic Flaw Description: A logical flaw refers to an error in the design or implementation of a system that can be exploited to gain unauthorized access or(...) Read more
- Liveness detection Description: Liveness detection is a technique used in biometric authentication that ensures that the provided sample comes from a living(...) Read more
- Lurking Attack Description: A Lurking Attack is a type of intrusion in the field of network security, where an attacker secretly observes and collects(...) Read more
- Local Exploit Description: Local exploitation is a type of cyber attack that requires physical or local access to the target system to be carried out. Unlike(...) Read more
- LDAP Injection Description: LDAP injection is a type of attack that exploits vulnerabilities in applications that use LDAP (Lightweight Directory Access(...) Read more
- LFI (Local File Inclusion) Description: Local File Inclusion (LFI) is a security vulnerability that allows an attacker to include files on a server through a web browser.(...) Read more
- Link Spoofing Description: Link spoofing is a technique used to redirect users to a malicious site by disguising the real URL. This practice relies on(...) Read more