Search results
Results from the Health.Zone Content Network
Logging is the act of keeping a log of events that occur in a computer system, such as problems, errors or information. Learn about different types of logs, such as event logs, transaction logs, message logs and server logs, and their uses and formats.
Login is the process of accessing a computer system or program by identifying and authenticating oneself. Learn about different methods of logging in, such as passwords, fingerprints, and social login, and the origin and usage of the term login.
Tracing in software engineering is the process of capturing and recording information about the execution of a software program for debugging or monitoring purposes. Learn about different types of tracing, such as application-specific and system-specific tracing, and various tools and techniques for trace generation, collection and analysis.
Learn how assignment statements set and re-set the value of variables in computer programming languages. Compare different notations, semantics, and types of assignment, such as single assignment and destructive assignment.
Secure Shell (SSH) is a protocol for securely operating network services over an unsecured network. It uses public-key cryptography to authenticate the remote computer and the user, and supports remote login, command-line execution, tunneling, and file transfer.
Lint is a term for a tool that checks programming errors, bugs, stylistic issues and suspicious constructs in source code. It originated from a Unix utility for C language and has evolved to support many other languages and features.
Computer programming or coding is the composition of sequences of instructions, called programs, that computers can follow to perform tasks. Learn about the origins, languages, and properties of programming, as well as related terms and concepts.
Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID to multiple software systems. Learn about the advantages, drawbacks, and security issues of SSO, as well as related concepts such as same-sign on, federated authentication, and social logons.