Internet Glossary packets from their source toward their ultimate destination through intermediary nodes; typically hardware devices called routers, bridges, gateways, firewalls or switches. Ordinary computers with multiple network cards can also forward packets and perform routing, though with more limited functionality and performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus constructing routing tables, which are held in the routers' memory, becomes very important for efficient routing. Routing Table An electronic file or database that is stored in a router or a networked computer. The routing table stores the routes (and in some cases, metrics associated with those routes) to a particular network destination. This information contains the topology of the network immediately around it. It is used to direct forwarding of packets by matching destination addresses in a packet to the network paths in routing table used to reach them. The construction of routing table is the primary goal of routing protocols. Screen fonts A typeface designed for display on a computer monitor screen. Other fonts may be installed for non-Latin language characters. You can select these fonts using character encoding in the browser. This function is accessed from the pull-down menus. Secure Sockets Layer (SSL) A security protocol that provides communication privacy. SSL enables client and server applications to communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery. SSL was developed by Netscape Communications Corporation and RSA Data Security, Inc. Secure/Multipurpose Internet Mail Extensions (S/MIME) An extension of MIME to support secure mail. It enables message originators to digitally sign email messages to provide proof of message origin and data integrity. It also enables messages to be transmitted in encrypted format to provide confidential communications. Security group A group that can be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. A security group can also be used as an email entity. Sending an email message to the group sends the message to all the members of the group. Security host An authentication device, supplemental to standard Windows and remote access server security, that verifies whether a caller from a remote client is authorized to connect to the remote access server. Serial port An interface on the computer that allows asynchronous transmission of data characters one bit at a time. Also called a communication or COM port. Server In general, a computer that provides shared resources to network users. Shareware This term refers to software available on public networks. Users can download software from a variety of web sites (Tucows.com was one of the first, Download.com is another) and use the fully functional software for a trial period. After the trial to continue using the software the user must register and pay for the product. Signature file A short text file that email users can automatically append at the end of each message they send. Commonly, signature files list the user's name, phone number, company, company URL, etc. Simple Mail Transfer Protocol (SMTP) A protocol used to send email on the Internet. SMTP is a set of rules regarding the interaction between a program sending email and a program receiving email. Spam Also known as unsolicited commercial email (UCE) it is unwanted, unsolicited junk email to a large number of recipients. Many programs are available to help diminish the flow of spam. Another tactic is to filter emails with certain key words (using the rules or filter function in email software) or filter out all
emails with country codes in the sender’s address including .cn, .tw, .ru etc. Streaming media Audio and video files transmitted on the Internet in a continuous fashion. Terabyte 1,024 gigabytes. Often interpreted as approximately 1 trillion bytes. Transmission Control Protocol/Internet Protocol (TCP/IP) A set of networking protocols that enable seamless communications across interconnected networks of computers with diverse hardware architectures and various operating systems. TCP/IP includes standards for how computers communicate and conventions for connecting networks and routing traffic. Uniform Resource Locator (URL) An address that uniquely identifies a location on the Internet. A URL for a World Wide web site is preceded with http://. A URL can contain more detail, such as the name of a page of hypertext, usually identified by the file name extension .html or .htm. Also see Internet Address definition. Universal Serial Bus (USB) Using USB, you can connect and disconnect devices without shutting down or restarting your computer. You can use a single connect many peripheral devices, including speakers, telephones, DVD drives, keyboards, scanners, and cameras. VoIP (Voice over Internet Protocol) A method for sending voice over a LAN, a WAN, or the Internet using TCP/IP packets. Users may be abl WAN (Wide area network) Connects networks in geographically diverse areas. Also see LAN definition. Web server A computer that is maintained by a system administrator or Internet service provider (ISP) and that responds to requests from a user's browser. WiFi The acronym for wireless fidelity, a wireless networking 802.11-standard. A Wi-Fi network can also be used to enable connectivity to a larger local area network (LAN), wide area network (WAN), or the Internet.
American Standard Code for Information Interchange (ASCII) A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters.
Cable modem A device that enables a broadband connection to the Internet by using cable television infrastructure. Access speeds vary greatly, with a maximum throughput of 10 megabits per second (Mbps).
ASP Application Service Provider - A company that offers organizations access over the Internet to applications and related services that would otherwise have to be located on site at the organization's premises.
CD-ROM Compact disk, read only memory optical disk storage that can hold approximately 700 MB of data. Most computers read and write to these disks making ROM a somewhat outdated portion of the term.
Attachment An audio, video or other data file that is attached to an email message.
Certificate A digital document that is commonly used for authentication and secure exchange of information on open networks. A certificate involves public and private encryption keys. Certificates are digitally signed by the issuing certification authority. Transparent to the user, the only sign of it being in use may be HTTPS:// in the URL. Certificates were created by Netscape Communications Corporation. It released a web browser called Mosaic Netscape 0.9 on October 13, 1994.
Autoresponder A computer program that automatically responds with a prewritten message to anyone who sends an email message to a particular email address or uses an online feedback form. Bit (binary digit) The smallest unit of information handled by a computer. One bit expresses a 1 or a 0 in a binary numeral, or a true or false logical condition. A group of 8 bits makes up a byte, which can represent many types of information, such as a letter of the alphabet, a decimal digit, or other character. Bit is also called binary digit. Bits Per Second (BPS) In digital communications, bandwidth is expressed in bits per second (bps). The number of bits transmitted every second, used as a measure of the speed at which a device, such as a modem, can transfer data. BitTorrent BitTorrent is a peer-to-peer file sharing (P2P) communications protocol. BitTorrent is a method of distributing large amounts of data widely without the original distributor incurring the entire costs of hardware, hosting and bandwidth resources. Using the BitTorrent protocol, recipients each supply data to newer recipients, reducing the cost and burden on any given individual source, providing redundancy against system problems, and reducing dependence upon the original distributor.
Derived from authoritative sources by David Vine
Blog A short form of `web log' blogs are a frequent, chronological publication of personal thoughts and web links. There are thousands of web sites where people can establish a blog at no charge. Once thought of only as a “personal diary” it has expanded into the business and political arenas. Such specialized search engines as Blogdigger, Bloglines and Google Blog Search may yield better results compared to a traditional web search.
David Vine Associates, LLC 963 Dougherty Road Aiken, SC 29803 803-649-1184
Bluetooth A short-range radio technology for Internet and mobile devices, aimed at simplifying communications among them. A device such as a cellular phone, printer, keyboard, mouse, or computer that has a Bluetooth radio to replace cables connecting those devices. Bridge A device that connects two LANs (local-area networks) or two segments of the same LAN. Unlike routers, bridges are protocol-independent. They simply forward packets without analyzing and re-routing messages. Broadband Broadband connections are typically 256 kilobytes per second (KBPS) or faster. Broadband includes DSL and cable modem service. Browser Software (e.g. Firefox, Internet Explorer, Opera, Sea Monkey) that interprets HTML files, formats them into web pages, and displays them to the end user. Some browsers also permit end users to send and receive email, read newsgroups, and play sound or video files embedded in web documents. Browser Add-On Also known as Extensions, these supplementary programs add new functionality, from toolbars button to a completely new feature. Bytes A unit of data that typically holds a single character, such as a letter, a digit, or a punctuation mark. Some single characters can take up more than one byte.
Certification Authority An entity responsible for establishing and vouching for the authenticity of public keys belonging to users or other certification authorities. Activities of a certification authority can include binding public keys to distinguished names through signed certificates, managing certificate serial numbers, and certificate revocation. Client Any computer or program connecting to, or requesting the services of, another computer or program. Client can also refer to the software that enables the computer or program to establish the connection. For a local area network (LAN) or the Internet, a computer that uses shared network resources provided by another computer (called a server). Control Key Shortcuts for faster use of the computer including the Control (CTRL) and other keys to accomplish a specific task. For example, CTRL+F opens a search box. Cookies Internet sites use small text files called cookies to keep track of user preferences and information. The web site automatically writes a cookie to the users hard drive so the site can recognize the user upon returning to the site. Dial-up Connection Connection to Internet using plain old telephone service (POTS) and a modem. Digital signature A means for originators of a message, file, or other digitally encoded information to bind their identity to the information. The process of digitally signing information entails transforming the information, as well as some secret information held by the sender, into a tag called a signature. Digital signatures are used in public key environments, and they provide nonrepudiation and integrity services. Digital Subscriber Line (DSL) A type of high-speed Internet connection using standard telephone wires. This is also referred to as a broadband connection. Discussion group An email list community where members can obtain and share information. Domain name This is the unique name that identifies an Internet site. Domain Names always have at least two parts, which are separated by dots (for instance lsoft.com). The part on the left is specific whereas the part on the right is more general. Domain Name System (DNS) A hierarchical, distributed database that contains mappings of DNS domain names to various types of data, such as IP addresses. DNS enables the location of computers and services by user-friendly names, and domain owner information stored in the database. Download To transfer a copy of a file from an Internet server to one's own computer. DVD Digital video disk, similar to a CD-ROM in appearance but holds 4.7 gigabytes
(single layer) or 8.5 gigabytes (dual layer). Most computers can read DVDs. Many newer computers can write to them as well. Dynamic Host Configuration Protocol (DHCP) A TCP/IP service provides a dynamic “leased” configuration of host IP addresses and distributes them to eligible network clients. DHCP provides safe, reliable, and simple TCP/IP network configuration, prevents address conflicts, and helps conserve the use of client IP addresses on the network. Email Bounces An automated electronic mail message from a mail system informing the sender of another message about a delivery problem. The original message is said to have bounced. "Hard" bounces are caused by invalid email addresses, whereas "soft" bounces are due to temporary conditions, such as overloaded inboxes. Email Error Codes Reveals specific connection error(s) in SMTP sent mail and the reason why an email bounces. The SMTP protocol requires that an SMTP server provide notification of delivery failure, if it determines that a message cannot be delivered to one or more recipients. More detail can be found in RFC 3461. Ethernet A standard for local area networks using twisted-pair cable. An Ethernet connection can carry data at 100 megabits per second (Mbps). File Transfer Protocol (FTP) A TCP/IP protocol used to copy files between two computers on the Internet. Firewall A combination of hardware and software that provides a security system, usually to prevent unauthorized access from outside to an internal network or intranet. A firewall prevents direct communication between network and external computers by routing communication through a proxy server outside of the network. The proxy server determines whether it is safe to let a file pass through to the network. A firewall is also called a security-edge gateway. Forum An online discussion group, where participants with common interests can exchange open messages. Broadly speaking this could include blogs with comment capability, message boards and Usenet Newsgroup. Freeware A free computer program made available on the Internet. Authors have various motivations ranging from exhibiting their skill to selling another version of the program with more features. Gateway A hardware or software set-up that functions as a translator between two dissimilar protocols. A gateway can also be the term to describe any mechanism providing access to another system. Gigabyte (GB) 1,024 megabytes, though often interpreted as approximately one billion bytes. GNU GNU stands for “GNU's Not Unix.” The GNU Project was conceived in 1983 as a way of bringing back the cooperative spirit from earlier days. Hard disk Contains one or more inflexible platters coated with material in which data can be recorded magnetically with read/write heads. The hard disk exists in a sealed case that protects it and allows the head to fly 10 millionths to 25 millionths of an inch above the surface of a platter. Generally ranges upward from 40 gigabytes of data storage capability. Host When a server acts as a host it means that other computers on the network do not have to download the software that this server carries. The site’s functionality comes from software on the host computer. Host name The DNS name of a device on a network. These names are used to locate a computer on a network or Internet. To find another computer, its host name must either appear in the Hosts file or be known by a DNS server
Hyperlink Colored and underlined text or a graphic that you click to go to a file, a location in a file, an HTML page on the World Wide web, or an HTML page on an intranet. Hypertext Markup Language (HTML) HTML files are ASCII text files with codes embedded to denote formatting and hypertext links all of which is interpreted as web pages by the browser. Hypertext Transfer Protocol (HTTP) The protocol used to transfer information on the World Wide web. An HTTP address (one kind of Uniform Resource Locator [URL]) takes the form: http://. Icon An image representing an object that can be manipulated by the user. Internet Interconnected Networks connected by routers. Packets of data are transferred via fiber optic or satellite. Software recognizes various protocols so you can view web pages and send email. Internet address An address for a resource on the Internet that is used by web browsers. An Internet address typically starts with a protocol name (www.), followed by the name of the organization (investigativetechnology) that maintains the site and a suffix (.com, .edu., .net, etc.) Internet Engineering Task Force (IETF) An open community of network designers, operators, vendors, and researchers concerned with the evolution of Internet architecture and the smooth operation of the Internet. Technical work is performed by working groups organized by topic areas (such as routing, transport, and security). Internet Protocol (IP) A TCP/IP protocol responsible for IP addressing, routing and the fragmentation and reassembly of IP packets. Internet service provider (ISP) A company that provides individuals or companies access to the Internet. An ISP provides a telephone number, a user name, a password, and other connection information so users can connect their computers to the ISP's computers. An ISP typically charges a monthly fee. Intranet A network within an organization that uses Internet technologies and protocols, but is available only to certain people, such as employees of a company. An intranet is also called a private network. IP address A 32-bit address used to identify a node on a network. Each node on the IP network must be assigned a unique IP address, which is made up of the network ID, plus a unique host ID. This address is typically represented with four numbers separated by a period (for example, 192.168.7.27). The current version (known as IP version 4 or IPv4) has not been substantially changed since RFC 791 was published in 1981. The IETF has developed IP version 6 (IPv6). This new version allow for many, many more addresses. The size of an address in IPv6 is 128 bits, four times larger than an address in IPv4. It allows for 340,282,366,920,938,463,463,374,607,431,768,211,456 (3.4 × 1038) possible addresses. Kilobyte (KB) 1,024 bytes, though often interpreted as 1,000 bytes. LISTSERV Software to create discussion lists that allow for ongoing discussions among members, with or without moderation. Most people use the term LISTSERV to refer to any type of two-way email system. Unlike a one-way list, a discussion list encourages interaction among members of a group (e.g. DVASEMINAR Yahoo Group). Every member can write to the list, and in doing so, everyone will receive a copy of the message. Lists can be moderated to insure quality. Local area network (LAN) A communications network connecting a group of computers, printers, and other devices located within a relatively limited area (for example, a building). A LAN allows any connected device to interact with any other on the network.
Log file A file that stores messages generated by an application, service, or operating system. These messages are used to track the operations performed. For example, web servers maintain log files listing every request made to the server. Log files are usually plain text (ASCII) files and often have a .log extension. Log files can be searched for on a computer simply by searching for all files with a . log extension. There can be hundreds of log files used for many different purposes on a typical computer. Megabyte (MB) 1,048,576 bytes, though often interpreted as 1 million bytes. Memory Generally, temporary storage Random Access Mmemory (RAM) directly connected to the processor that depends on electrical power for retention of data. Memory is often differentiated from computer storage (for example, hard disks, CD-ROMs, etc.) permanently stores data when the computer is turned off. Modem (modulator/demodulator) A device that allows computer information to be transmitted and received over a telephone line. The transmitting modem translates digital computer data into analog signals that can be carried over a phone line. The receiving modem translates the analog signals back to digital form. Also, nearly all modems have fax transmission and reception capability. Moderated list Moderators can forward all or some of the messages, received by the list subscribers, to the email list if they want to. It is also possible for the moderator to perform several tasks such as editing and deleting messages. A moderated list thus puts the list owner in the equivalent position as an editor of a newspaper. Mozilla Firefox Mozilla Firefox is a freeware web browser developed by the Mozilla Corporation, Sun Microsystems and a large community of external contributors. Firefox is a cross-platform browser, providing for Microsoft Windows, Mac OS, and Linux. Thunderbird is the email freeware that many people use in conjunction with Firefox. Name resolution The process of having software translate between names that are easy for users to work with and numerical IP addresses, which are difficult for users but necessary for TCP/IP communications. Name resolution is provided by DNS. Network adapter A device and appropriate software that connects your computer to a network via Ethernet cable, PCMCIA card or WiFi. Network News Transfer Protocol (NNTP) A TCP/IP protocol used to distribute network news messages to NNTP servers and clients (newsreaders built into Outlook, Thunderbird, etc.) on the Internet. NNTP is designed so that news articles are stored on a server in a central database, thus enabling a user to select specific items to read. There are approximately 150,000 worldwide Usenet Newsgroups. A substantial archive is owned by Google and can be searched there. Network protocol The language a computer uses to communicate over a network. For a computer to communicate with another computer, they both must use the same protocol. Node Any device (PCs, servers, and printers) connected to a network. Operating system A program such as Linux or Windows that manages all other programs in a computer. OpenOffice.Org OpenOffice is a freeware replacement for Microsoft Office and is fully compatible with MS Office and many other brands of software. It is a suite of integrated programs including word processor, spreadsheet, presentation, database, drawing and mathematical capabilities. Opt-in An approach to email marketing in which customers must explicitly request to be included in an email campaign or newsletter.
Opt-out Email marketing in which potential customers are included in email campaigns or newsletters until they specifically request not to be subscribed any longer. This method is not recommended and may in some cases be illegal. Many of these annoying emails will simply put you on another list when you opt-out of the mailing. The same is true with many junk faxes that provide automated optout schemes. Out-of-office reply Automatic reply message triggered by incoming email to a user's inbox, typically activated when users are on vacation or otherwise unavailable. Packet A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network. When any file (e-mail message, HTML file, GIF file, URL request, etc.) is sent from one place to another on the Internet, the Transmission Control Protocol (TCP) layer of TCP/IP divides the file into "chunks" of an efficient size for routing. Each of these packets is separately numbered and includes the Internet address of the destination. An Ethernet LAN typically will have a maximum transmission unit (MTU) of 1500; however, this may be lowered by a router. PCMCIA device A removable device, approximately the size of a credit card, that can be inserted into a PCMCIA slot in a usually in a laptop computer. PCMCIA devices can include modems, multimedia cards and WiFi cards. Port A connection point on your computer where you can connect devices that pass data into and out of a computer. For example, a printer is typically connected to a parallel port (also called an LPT port), and a modem is typically connected to a serial port (also called a COM port). Private key The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key. Privacy policy A web site's privacy policy tells you what kind of information the web site collects, to whom it gives that information, and how it uses the information. Personally identifiable information is information that can be used to identify or contact you, such as your name, email address, home or work address, or telephone number. However, a web site only has access to the personally identifiable information that you provide, or to the choices you make while visiting a web site. See also cookies definition. Protocol A set of rules and conventions for sending information over a network. These rules govern the content, format, timing, sequencing, and error control of messages exchanged among network devices. Public key cryptography A method of cryptography in which two different keys are used: a public key for encrypting data and a private key for decrypting data. Public key cryptography is also called asymmetric cryptography. Random Access Memory (RAM) Memory that can be read from or written to by a computer or other devices. Information stored in RAM is lost when the computer is turned off. See also memory definition. Request for Comments (RFC) An official document of the Internet Engineering Task Force (IETF) that specifies the details for protocols included in the TCP/IP family. Router Hardware that helps LANs and WANs achieve interoperability and connectivity, and can link LANs that have different network topologies. Routers match packet headers to a LAN segment and choose the best path for the packet, optimizing network performance. Routing The process of forwarding packets through an network from a source host to a destination host. Routing directs forwarding, the passing of logically addressed
(single layer) or 8.5 gigabytes (dual layer). Most computers can read DVDs. Many newer computers can write to them as well. Dynamic Host Configuration Protocol (DHCP) A TCP/IP service provides a dynamic “leased” configuration of host IP addresses and distributes them to eligible network clients. DHCP provides safe, reliable, and simple TCP/IP network configuration, prevents address conflicts, and helps conserve the use of client IP addresses on the network. Email Bounces An automated electronic mail message from a mail system informing the sender of another message about a delivery problem. The original message is said to have bounced. "Hard" bounces are caused by invalid email addresses, whereas "soft" bounces are due to temporary conditions, such as overloaded inboxes. Email Error Codes Reveals specific connection error(s) in SMTP sent mail and the reason why an email bounces. The SMTP protocol requires that an SMTP server provide notification of delivery failure, if it determines that a message cannot be delivered to one or more recipients. More detail can be found in RFC 3461. Ethernet A standard for local area networks using twisted-pair cable. An Ethernet connection can carry data at 100 megabits per second (Mbps). File Transfer Protocol (FTP) A TCP/IP protocol used to copy files between two computers on the Internet. Firewall A combination of hardware and software that provides a security system, usually to prevent unauthorized access from outside to an internal network or intranet. A firewall prevents direct communication between network and external computers by routing communication through a proxy server outside of the network. The proxy server determines whether it is safe to let a file pass through to the network. A firewall is also called a security-edge gateway. Forum An online discussion group, where participants with common interests can exchange open messages. Broadly speaking this could include blogs with comment capability, message boards and Usenet Newsgroup. Freeware A free computer program made available on the Internet. Authors have various motivations ranging from exhibiting their skill to selling another version of the program with more features. Gateway A hardware or software set-up that functions as a translator between two dissimilar protocols. A gateway can also be the term to describe any mechanism providing access to another system. Gigabyte (GB) 1,024 megabytes, though often interpreted as approximately one billion bytes. GNU GNU stands for “GNU's Not Unix.” The GNU Project was conceived in 1983 as a way of bringing back the cooperative spirit from earlier days. Hard disk Contains one or more inflexible platters coated with material in which data can be recorded magnetically with read/write heads. The hard disk exists in a sealed case that protects it and allows the head to fly 10 millionths to 25 millionths of an inch above the surface of a platter. Generally ranges upward from 40 gigabytes of data storage capability. Host When a server acts as a host it means that other computers on the network do not have to download the software that this server carries. The site’s functionality comes from software on the host computer. Host name The DNS name of a device on a network. These names are used to locate a computer on a network or Internet. To find another computer, its host name must either appear in the Hosts file or be known by a DNS server
Hyperlink Colored and underlined text or a graphic that you click to go to a file, a location in a file, an HTML page on the World Wide web, or an HTML page on an intranet. Hypertext Markup Language (HTML) HTML files are ASCII text files with codes embedded to denote formatting and hypertext links all of which is interpreted as web pages by the browser. Hypertext Transfer Protocol (HTTP) The protocol used to transfer information on the World Wide web. An HTTP address (one kind of Uniform Resource Locator [URL]) takes the form: http://. Icon An image representing an object that can be manipulated by the user. Internet Interconnected Networks connected by routers. Packets of data are transferred via fiber optic or satellite. Software recognizes various protocols so you can view web pages and send email. Internet address An address for a resource on the Internet that is used by web browsers. An Internet address typically starts with a protocol name (www.), followed by the name of the organization (investigativetechnology) that maintains the site and a suffix (.com, .edu., .net, etc.) Internet Engineering Task Force (IETF) An open community of network designers, operators, vendors, and researchers concerned with the evolution of Internet architecture and the smooth operation of the Internet. Technical work is performed by working groups organized by topic areas (such as routing, transport, and security). Internet Protocol (IP) A TCP/IP protocol responsible for IP addressing, routing and the fragmentation and reassembly of IP packets. Internet service provider (ISP) A company that provides individuals or companies access to the Internet. An ISP provides a telephone number, a user name, a password, and other connection information so users can connect their computers to the ISP's computers. An ISP typically charges a monthly fee. Intranet A network within an organization that uses Internet technologies and protocols, but is available only to certain people, such as employees of a company. An intranet is also called a private network. IP address A 32-bit address used to identify a node on a network. Each node on the IP network must be assigned a unique IP address, which is made up of the network ID, plus a unique host ID. This address is typically represented with four numbers separated by a period (for example, 192.168.7.27). The current version (known as IP version 4 or IPv4) has not been substantially changed since RFC 791 was published in 1981. The IETF has developed IP version 6 (IPv6). This new version allow for many, many more addresses. The size of an address in IPv6 is 128 bits, four times larger than an address in IPv4. It allows for 340,282,366,920,938,463,463,374,607,431,768,211,456 (3.4 × 1038) possible addresses. Kilobyte (KB) 1,024 bytes, though often interpreted as 1,000 bytes. LISTSERV Software to create discussion lists that allow for ongoing discussions among members, with or without moderation. Most people use the term LISTSERV to refer to any type of two-way email system. Unlike a one-way list, a discussion list encourages interaction among members of a group (e.g. DVASEMINAR Yahoo Group). Every member can write to the list, and in doing so, everyone will receive a copy of the message. Lists can be moderated to insure quality. Local area network (LAN) A communications network connecting a group of computers, printers, and other devices located within a relatively limited area (for example, a building). A LAN allows any connected device to interact with any other on the network.
Log file A file that stores messages generated by an application, service, or operating system. These messages are used to track the operations performed. For example, web servers maintain log files listing every request made to the server. Log files are usually plain text (ASCII) files and often have a .log extension. Log files can be searched for on a computer simply by searching for all files with a . log extension. There can be hundreds of log files used for many different purposes on a typical computer. Megabyte (MB) 1,048,576 bytes, though often interpreted as 1 million bytes. Memory Generally, temporary storage Random Access Mmemory (RAM) directly connected to the processor that depends on electrical power for retention of data. Memory is often differentiated from computer storage (for example, hard disks, CD-ROMs, etc.) permanently stores data when the computer is turned off. Modem (modulator/demodulator) A device that allows computer information to be transmitted and received over a telephone line. The transmitting modem translates digital computer data into analog signals that can be carried over a phone line. The receiving modem translates the analog signals back to digital form. Also, nearly all modems have fax transmission and reception capability. Moderated list Moderators can forward all or some of the messages, received by the list subscribers, to the email list if they want to. It is also possible for the moderator to perform several tasks such as editing and deleting messages. A moderated list thus puts the list owner in the equivalent position as an editor of a newspaper. Mozilla Firefox Mozilla Firefox is a freeware web browser developed by the Mozilla Corporation, Sun Microsystems and a large community of external contributors. Firefox is a cross-platform browser, providing for Microsoft Windows, Mac OS, and Linux. Thunderbird is the email freeware that many people use in conjunction with Firefox. Name resolution The process of having software translate between names that are easy for users to work with and numerical IP addresses, which are difficult for users but necessary for TCP/IP communications. Name resolution is provided by DNS. Network adapter A device and appropriate software that connects your computer to a network via Ethernet cable, PCMCIA card or WiFi. Network News Transfer Protocol (NNTP) A TCP/IP protocol used to distribute network news messages to NNTP servers and clients (newsreaders built into Outlook, Thunderbird, etc.) on the Internet. NNTP is designed so that news articles are stored on a server in a central database, thus enabling a user to select specific items to read. There are approximately 150,000 worldwide Usenet Newsgroups. A substantial archive is owned by Google and can be searched there. Network protocol The language a computer uses to communicate over a network. For a computer to communicate with another computer, they both must use the same protocol. Node Any device (PCs, servers, and printers) connected to a network. Operating system A program such as Linux or Windows that manages all other programs in a computer. OpenOffice.Org OpenOffice is a freeware replacement for Microsoft Office and is fully compatible with MS Office and many other brands of software. It is a suite of integrated programs including word processor, spreadsheet, presentation, database, drawing and mathematical capabilities. Opt-in An approach to email marketing in which customers must explicitly request to be included in an email campaign or newsletter.
Opt-out Email marketing in which potential customers are included in email campaigns or newsletters until they specifically request not to be subscribed any longer. This method is not recommended and may in some cases be illegal. Many of these annoying emails will simply put you on another list when you opt-out of the mailing. The same is true with many junk faxes that provide automated optout schemes. Out-of-office reply Automatic reply message triggered by incoming email to a user's inbox, typically activated when users are on vacation or otherwise unavailable. Packet A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network. When any file (e-mail message, HTML file, GIF file, URL request, etc.) is sent from one place to another on the Internet, the Transmission Control Protocol (TCP) layer of TCP/IP divides the file into "chunks" of an efficient size for routing. Each of these packets is separately numbered and includes the Internet address of the destination. An Ethernet LAN typically will have a maximum transmission unit (MTU) of 1500; however, this may be lowered by a router. PCMCIA device A removable device, approximately the size of a credit card, that can be inserted into a PCMCIA slot in a usually in a laptop computer. PCMCIA devices can include modems, multimedia cards and WiFi cards. Port A connection point on your computer where you can connect devices that pass data into and out of a computer. For example, a printer is typically connected to a parallel port (also called an LPT port), and a modem is typically connected to a serial port (also called a COM port). Private key The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key. Privacy policy A web site's privacy policy tells you what kind of information the web site collects, to whom it gives that information, and how it uses the information. Personally identifiable information is information that can be used to identify or contact you, such as your name, email address, home or work address, or telephone number. However, a web site only has access to the personally identifiable information that you provide, or to the choices you make while visiting a web site. See also cookies definition. Protocol A set of rules and conventions for sending information over a network. These rules govern the content, format, timing, sequencing, and error control of messages exchanged among network devices. Public key cryptography A method of cryptography in which two different keys are used: a public key for encrypting data and a private key for decrypting data. Public key cryptography is also called asymmetric cryptography. Random Access Memory (RAM) Memory that can be read from or written to by a computer or other devices. Information stored in RAM is lost when the computer is turned off. See also memory definition. Request for Comments (RFC) An official document of the Internet Engineering Task Force (IETF) that specifies the details for protocols included in the TCP/IP family. Router Hardware that helps LANs and WANs achieve interoperability and connectivity, and can link LANs that have different network topologies. Routers match packet headers to a LAN segment and choose the best path for the packet, optimizing network performance. Routing The process of forwarding packets through an network from a source host to a destination host. Routing directs forwarding, the passing of logically addressed
Internet Glossary packets from their source toward their ultimate destination through intermediary nodes; typically hardware devices called routers, bridges, gateways, firewalls or switches. Ordinary computers with multiple network cards can also forward packets and perform routing, though with more limited functionality and performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus constructing routing tables, which are held in the routers' memory, becomes very important for efficient routing. Routing Table An electronic file or database that is stored in a router or a networked computer. The routing table stores the routes (and in some cases, metrics associated with those routes) to a particular network destination. This information contains the topology of the network immediately around it. It is used to direct forwarding of packets by matching destination addresses in a packet to the network paths in routing table used to reach them. The construction of routing table is the primary goal of routing protocols. Screen fonts A typeface designed for display on a computer monitor screen. Other fonts may be installed for non-Latin language characters. You can select these fonts using character encoding in the browser. This function is accessed from the pull-down menus. Secure Sockets Layer (SSL) A security protocol that provides communication privacy. SSL enables client and server applications to communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery. SSL was developed by Netscape Communications Corporation and RSA Data Security, Inc. Secure/Multipurpose Internet Mail Extensions (S/MIME) An extension of MIME to support secure mail. It enables message originators to digitally sign email messages to provide proof of message origin and data integrity. It also enables messages to be transmitted in encrypted format to provide confidential communications. Security group A group that can be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. A security group can also be used as an email entity. Sending an email message to the group sends the message to all the members of the group. Security host An authentication device, supplemental to standard Windows and remote access server security, that verifies whether a caller from a remote client is authorized to connect to the remote access server. Serial port An interface on the computer that allows asynchronous transmission of data characters one bit at a time. Also called a communication or COM port. Server In general, a computer that provides shared resources to network users. Shareware This term refers to software available on public networks. Users can download software from a variety of web sites (Tucows.com was one of the first, Download.com is another) and use the fully functional software for a trial period. After the trial to continue using the software the user must register and pay for the product. Signature file A short text file that email users can automatically append at the end of each message they send. Commonly, signature files list the user's name, phone number, company, company URL, etc. Simple Mail Transfer Protocol (SMTP) A protocol used to send email on the Internet. SMTP is a set of rules regarding the interaction between a program sending email and a program receiving email. Spam Also known as unsolicited commercial email (UCE) it is unwanted, unsolicited junk email to a large number of recipients. Many programs are available to help diminish the flow of spam. Another tactic is to filter emails with certain key words (using the rules or filter function in email software) or filter out all
emails with country codes in the sender’s address including .cn, .tw, .ru etc. Streaming media Audio and video files transmitted on the Internet in a continuous fashion. Terabyte 1,024 gigabytes. Often interpreted as approximately 1 trillion bytes. Transmission Control Protocol/Internet Protocol (TCP/IP) A set of networking protocols that enable seamless communications across interconnected networks of computers with diverse hardware architectures and various operating systems. TCP/IP includes standards for how computers communicate and conventions for connecting networks and routing traffic. Uniform Resource Locator (URL) An address that uniquely identifies a location on the Internet. A URL for a World Wide web site is preceded with http://. A URL can contain more detail, such as the name of a page of hypertext, usually identified by the file name extension .html or .htm. Also see Internet Address definition. Universal Serial Bus (USB) Using USB, you can connect and disconnect devices without shutting down or restarting your computer. You can use a single connect many peripheral devices, including speakers, telephones, DVD drives, keyboards, scanners, and cameras. VoIP (Voice over Internet Protocol) A method for sending voice over a LAN, a WAN, or the Internet using TCP/IP packets. Users may be abl WAN (Wide area network) Connects networks in geographically diverse areas. Also see LAN definition. Web server A computer that is maintained by a system administrator or Internet service provider (ISP) and that responds to requests from a user's browser. WiFi The acronym for wireless fidelity, a wireless networking 802.11-standard. A Wi-Fi network can also be used to enable connectivity to a larger local area network (LAN), wide area network (WAN), or the Internet.
American Standard Code for Information Interchange (ASCII) A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters.
Cable modem A device that enables a broadband connection to the Internet by using cable television infrastructure. Access speeds vary greatly, with a maximum throughput of 10 megabits per second (Mbps).
ASP Application Service Provider - A company that offers organizations access over the Internet to applications and related services that would otherwise have to be located on site at the organization's premises.
CD-ROM Compact disk, read only memory optical disk storage that can hold approximately 700 MB of data. Most computers read and write to these disks making ROM a somewhat outdated portion of the term.
Attachment An audio, video or other data file that is attached to an email message.
Certificate A digital document that is commonly used for authentication and secure exchange of information on open networks. A certificate involves public and private encryption keys. Certificates are digitally signed by the issuing certification authority. Transparent to the user, the only sign of it being in use may be HTTPS:// in the URL. Certificates were created by Netscape Communications Corporation. It released a web browser called Mosaic Netscape 0.9 on October 13, 1994.
Autoresponder A computer program that automatically responds with a prewritten message to anyone who sends an email message to a particular email address or uses an online feedback form. Bit (binary digit) The smallest unit of information handled by a computer. One bit expresses a 1 or a 0 in a binary numeral, or a true or false logical condition. A group of 8 bits makes up a byte, which can represent many types of information, such as a letter of the alphabet, a decimal digit, or other character. Bit is also called binary digit. Bits Per Second (BPS) In digital communications, bandwidth is expressed in bits per second (bps). The number of bits transmitted every second, used as a measure of the speed at which a device, such as a modem, can transfer data. BitTorrent BitTorrent is a peer-to-peer file sharing (P2P) communications protocol. BitTorrent is a method of distributing large amounts of data widely without the original distributor incurring the entire costs of hardware, hosting and bandwidth resources. Using the BitTorrent protocol, recipients each supply data to newer recipients, reducing the cost and burden on any given individual source, providing redundancy against system problems, and reducing dependence upon the original distributor.
Derived from authoritative sources by David Vine
Blog A short form of `web log' blogs are a frequent, chronological publication of personal thoughts and web links. There are thousands of web sites where people can establish a blog at no charge. Once thought of only as a “personal diary” it has expanded into the business and political arenas. Such specialized search engines as Blogdigger, Bloglines and Google Blog Search may yield better results compared to a traditional web search.
David Vine Associates, LLC 963 Dougherty Road Aiken, SC 29803 803-649-1184
Bluetooth A short-range radio technology for Internet and mobile devices, aimed at simplifying communications among them. A device such as a cellular phone, printer, keyboard, mouse, or computer that has a Bluetooth radio to replace cables connecting those devices. Bridge A device that connects two LANs (local-area networks) or two segments of the same LAN. Unlike routers, bridges are protocol-independent. They simply forward packets without analyzing and re-routing messages. Broadband Broadband connections are typically 256 kilobytes per second (KBPS) or faster. Broadband includes DSL and cable modem service. Browser Software (e.g. Firefox, Internet Explorer, Opera, Sea Monkey) that interprets HTML files, formats them into web pages, and displays them to the end user. Some browsers also permit end users to send and receive email, read newsgroups, and play sound or video files embedded in web documents. Browser Add-On Also known as Extensions, these supplementary programs add new functionality, from toolbars button to a completely new feature. Bytes A unit of data that typically holds a single character, such as a letter, a digit, or a punctuation mark. Some single characters can take up more than one byte.
Certification Authority An entity responsible for establishing and vouching for the authenticity of public keys belonging to users or other certification authorities. Activities of a certification authority can include binding public keys to distinguished names through signed certificates, managing certificate serial numbers, and certificate revocation. Client Any computer or program connecting to, or requesting the services of, another computer or program. Client can also refer to the software that enables the computer or program to establish the connection. For a local area network (LAN) or the Internet, a computer that uses shared network resources provided by another computer (called a server). Control Key Shortcuts for faster use of the computer including the Control (CTRL) and other keys to accomplish a specific task. For example, CTRL+F opens a search box. Cookies Internet sites use small text files called cookies to keep track of user preferences and information. The web site automatically writes a cookie to the users hard drive so the site can recognize the user upon returning to the site. Dial-up Connection Connection to Internet using plain old telephone service (POTS) and a modem. Digital signature A means for originators of a message, file, or other digitally encoded information to bind their identity to the information. The process of digitally signing information entails transforming the information, as well as some secret information held by the sender, into a tag called a signature. Digital signatures are used in public key environments, and they provide nonrepudiation and integrity services. Digital Subscriber Line (DSL) A type of high-speed Internet connection using standard telephone wires. This is also referred to as a broadband connection. Discussion group An email list community where members can obtain and share information. Domain name This is the unique name that identifies an Internet site. Domain Names always have at least two parts, which are separated by dots (for instance lsoft.com). The part on the left is specific whereas the part on the right is more general. Domain Name System (DNS) A hierarchical, distributed database that contains mappings of DNS domain names to various types of data, such as IP addresses. DNS enables the location of computers and services by user-friendly names, and domain owner information stored in the database. Download To transfer a copy of a file from an Internet server to one's own computer. DVD Digital video disk, similar to a CD-ROM in appearance but holds 4.7 gigabytes