104 Results for:DOS
- Sort by:
DOS (disk operating system)
A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular family of disk operating systems, most commonly MS-DOS, an acronym for Microsoft DOS. Read Full Definition
Associated Glossaries
MS-DOS (Microsoft Disk Operating System)
MS-DOS (Microsoft Disk Operating System) was the Microsoft-marketed version of the first widely-installed operating system in personal computers. Read Full Definition
Associated Glossaries
SYN flood attack
A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server. Read Full Definition
Associated Glossaries
CONFIG.SYS
CONFIG.SYS is a text file containing disk operating system (DOS) commands that tell the operating system (OS) how the computer is initially set up. Read Full Definition
Associated Glossaries
denial-of-service attack
A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources. Read Full Definition
Associated Glossaries
FDISK
FDISK is a disk utility included in all versions of MS-DOS, Windows and Linux for formatting or partitioning a hard disk drive, or to delete different portions of it. Read Full Definition
Associated Glossaries
mail bomb
A mail bomb is a form of a denial-of-service (DoS) attack designed to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system. Read Full Definition
Associated Glossaries
IO.SYS
IO.SYS is a hidden executable binary file that processes instructions that tell the operating system (OS) how the computer is set up when it is booted or started. Read Full Definition
Associated Glossaries
Elk Cloner
Elk Cloner is the first personal computer virus or self-replicating program known to have spread in the wild on a large scale. Read Full Definition
Associated Glossaries
active attack
An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. Read Full Definition
Associated Glossaries