[#maccapit]: MAC

The abbreviation may refer to multiple things, with “Media Access Control” being the most prevalent. Other options that may be common when discussing security could include Mandatory Access Control or Message Authentication Code.

In addition to MAC, which is sometimes pronounced like “Mac”, the term “Mac” is commonly used as an abbreviation for Macintosh.

[#maclwrcs]: Mac
An abbreviation for Macintosh. (See also MAC, which may be an abbreviation.)
[#macintsh]: Macintosh
A brand name for computers made by Apple, as well as a reference to the software platform that uses one of the operating systems (MacOS or Mac OSX) that were designed for those computers.
[#macos]: MacOS
An operating system which predates Mac OSX. See Mac OS.
[#macosx]: Mac OSX
An operating system. See: Darwin-based operating systems.
[#mndactrl]: Mandatory Access Control
(sometimes abbreviated “MAC”, an abbreviation with a namespace conflict)
Info which may need further review: Similar terms include Descretionary Access Control and Role Based Access Control. Unfortunately, this term is abbreviated as “MAC” when it is used in the field of computer network security, and so there is a namespace conflict with Media Access Control (which is used with the field of computer networking).
[#mdiactrl]: Media Access Control
Info which may need further review:

MAC may, in the field of computer networking, most commonly stands for “Media Access Control”. The term is very often used referencing the term “MAC address”.

Usage of the term “MAC address” may reflect unfamiliarity with the newer terms (namely EUI-48), or may reflect familiarity with the older terms from Xerox's Ethernet addressing scheme. There are other terms for this same address format: see the section about EUI-48/MAC-48 addresses which contains multiple such terms.

(There were some further details that had been temporarily placed in this glossary. These details have since moved to the section about MAC-48 addresses.)

[#memory]: memory

There are various types of “memory”. The most commonly used meaning of the term is a reference to “main memory”, often called “RAM”. (For more details, see the section about RAM.) In the 1980's when the Apple ][ was popular, the term may have also referred to another method of keeping track of bits: that method is now more frequently called “storage” or some similar but longer term like “long term data storage”. Examples of long term data storage would include a hard drive or a USB stick. (Floppy disks should no longer be seriously relied upon for long term storage.) Another type of “memory” could be hardware cache.

“Virtual memory” refers to an ability to use disk space to store data that some software may treat as being in memory. The software will generally not be allowed to access that data until the data is then moved from the disk back into main memory. (The software will generally not notice a lack of access to the data; rather, the software's attempt to access the memory will generally be successful after being delayed while the virtual memory manager copies the data back into main memory.)

[#milter]: milter
A portmanteau of mail and filter. May be related to the E-Mail program sendmail. sendmail.com Open Source Website FAQ mentions milter.org as merging with sendmail.com and others.
[#minidin]: Mini-DIN

Similar in nature to a DIN connector. The PS/2 mouse connectors and PS/2 keyboard connectors were fairly well known implementations of Mini-DIN connectors.

The outside is essentially round although there are some notches, and there may be a “block” of plastic in addition to the pins. The placement of the second row of pins and the block connector can be used to determine where other pins may or may not exist. A visual of where pins may exist with various connectors can be seen in Wikipedia's page on Mini-Din: section about “Standard connectors”.

[#multicst]: multicast

Information gets sent to a specific IP address that is recognized as being a “multicast” address. The information is then relayed to other computers that have “subscribed” to, a.k.a. “joined”, a “multicast group”.

See: Multicast.

[#mlticsld]: Multicast Listener Discovery (“MLD”)
This protocol was derived from IGMPv2 for IPv4, but this protocol is meant to be used with IPv6 and uses ICMPv6. See the section about multicast in IPv6.

[#mltfraut]: multi-factor authentication

The usage of multiple different approaches to authentication. Commonly this may involve using two or three of the following generalized approaches:

Who: Checking who somebody is

Using biometric data such as fingerprint scanning, retinal scanning, or voice recognition

Knows: Checking what a person knows

Asking questions such as a passphrase. Another approach may be to ask questions about a person's life, such as events that have happened to that person, or a person's preferences. However, such an approach may often be more compromisable by people who know the person well.

Has: Checking what a person has possession of

A physical key, which opens a physical lock, is likely the most classic example. Another example would be an electronic devices that contains a signature that a person is unlikely to remember. An example is a physical payment industry card (such as a credit card).