- MAC Filter or MAC Limiting MAC filtering, also known as MAC address filtering or MAC limiting, is a network access control technique where a network device, typically a router or switch, uses a list of allowed MAC addresses to determine which devices can connect to the network. Unauthorized devices with MAC addresses not on the list are blocked. This method can improve network security but should be combined with other security practices, as MAC addresses can be spoofed by knowledgeable attackers.
- MAC header A section of a data packet that contains information about the sender and recipient of the packet, as well as the type of data contained in the packet. It is used in networking to allow devices to communicate with each other and route data packets properly. Examples include Ethernet MAC addresses and Wi-Fi MAC addresses.
- Machine language A set of instructions that a computer can execute directly without the need for translation. It is used in computer programming to write low-level code that can be run efficiently on a specific type of processor. Examples include x86 machine language for Intel-based processors and ARM machine language for ARM-based processors.
- Machine learning A type of artificial intelligence that involves the use of algorithms and statistical models to enable computers to improve their performance on a specific task without being explicitly programmed. It is used in a variety of industries, such as finance, healthcare, and retail, to improve decision-making and automate processes. For example, a credit card company may use machine learning to detect fraudulent transactions.
- MAC (Media Access Control) Address A unique identifier that is assigned to a network interface on a device. It is used to identify and communicate with devices on a network. Examples include the MAC address of a network card, a wireless adapter, or a Bluetooth device.
- Macro Virus A type of malware that is spread through infected documents or files that contain macro commands. It is used to automate actions and perform malicious tasks, such as deleting files or stealing sensitive information. Examples include the Melissa virus, which spread through email attachments, and the WannaCry ransomware, which used macros to encrypt victims' files.
- Magnetic card reader A device that reads the information stored on a magnetic strip or magnetic stripe card. It is used in various industries, such as financial services and transportation, to authenticate users and access information. Examples include ATM card readers and credit card swipe machines.
- Magnetic Remanence Magnetic remanence refers to the residual magnetization left on a storage medium, such as a hard disk or a magnetic tape, even after attempts to erase the data. This property can potentially allow previously stored data to be recovered, which presents security challenges when disposing of or repurposing storage devices. Methods like degaussing can be used to reduce magnetic remanence to protect sensitive information.
- Mail relay server A computer that acts as an intermediary between a sender's mail server and a recipient's mail server. It is used in email systems to route messages and ensure delivery to the correct recipients. Examples include Google's Gmail server and Microsoft's Exchange server.
- Mainframe A large, powerful computer designed for high-volume data processing and transaction processing. It is used in industries such as finance, telecommunications, and government to handle large amounts of data and support multiple users simultaneously. Examples include IBM's z/OS operating system and the CICS transaction processing system.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.