Sie sind auf Seite 1von 4

Internet Glossary

packets from their source toward their ultimate destination through intermediary emails with country codes in the sender’s address including .cn, .tw, .ru etc. American Standard Code for Information Interchange (ASCII) Cable modem
nodes; typically hardware devices called routers, bridges, gateways, firewalls or A standard single-byte character encoding scheme used for text-based data. A device that enables a broadband connection to the Internet by using cable
switches. Ordinary computers with multiple network cards can also forward Streaming media ASCII uses designated 7-bit or 8-bit number combinations to represent either television infrastructure. Access speeds vary greatly, with a maximum through-
packets and perform routing, though with more limited functionality and per- Audio and video files transmitted on the Internet in a continuous fashion. 128 or 256 possible characters. put of 10 megabits per second (Mbps).
formance. The routing process usually directs forwarding on the basis of rout-
ing tables which maintain a record of the routes to various network destinations. Terabyte ASP CD-ROM
Thus constructing routing tables, which are held in the routers' memory, be- 1,024 gigabytes. Often interpreted as approximately 1 trillion bytes. Application Service Provider - A company that offers organizations access Compact disk, read only memory optical disk storage that can hold approxi-
comes very important for efficient routing. over the Internet to applications and related services that would otherwise mately 700 MB of data. Most computers read and write to these disks making
Transmission Control Protocol/Internet Protocol (TCP/IP) have to be located on site at the organization's premises. ROM a somewhat outdated portion of the term.
Routing Table A set of networking protocols that enable seamless communications across
An electronic file or database that is stored in a router or a networked computer. interconnected networks of computers with diverse hardware architectures and Attachment Certificate
The routing table stores the routes (and in some cases, metrics associated with various operating systems. TCP/IP includes standards for how computers com- An audio, video or other data file that is attached to an email message. A digital document that is commonly used for authentication and secure ex-
those routes) to a particular network destination. This information contains the municate and conventions for connecting networks and routing traffic. change of information on open networks. A certificate involves public and pri-
topology of the network immediately around it. It is used to direct forwarding Autoresponder vate encryption keys. Certificates are digitally signed by the issuing certifica-
of packets by matching destination addresses in a packet to the network paths in Uniform Resource Locator (URL) A computer program that automatically responds with a prewritten message to tion authority. Transparent to the user, the only sign of it being in use may be
routing table used to reach them. The construction of routing table is the pri- An address that uniquely identifies a location on the Internet. A URL for a anyone who sends an email message to a particular email address or uses an HTTPS:// in the URL. Certificates were created by Netscape Communications
mary goal of routing protocols. World Wide web site is preceded with http://. A URL can contain more detail, online feedback form. Corporation. It released a web browser called Mosaic Netscape 0.9 on October
such as the name of a page of hypertext, usually identified by the file name 13, 1994.
Screen fonts extension .html or .htm. Also see Internet Address definition. Bit (binary digit)
A typeface designed for display on a computer monitor screen. Other fonts may The smallest unit of information handled by a computer. One bit expresses a 1 Certification Authority
be installed for non-Latin language characters. You can select these fonts using Universal Serial Bus (USB) or a 0 in a binary numeral, or a true or false logical condition. A group of 8 An entity responsible for establishing and vouching for the authenticity of pub-
character encoding in the browser. This function is accessed from the pull-down Using USB, you can connect and disconnect devices without shutting down or bits makes up a byte, which can represent many types of information, such as lic keys belonging to users or other certification authorities. Activities of a certi-
menus. restarting your computer. You can use a single connect many peripheral de- a letter of the alphabet, a decimal digit, or other character. Bit is also called fication authority can include binding public keys to distinguished names
vices, including speakers, telephones, DVD drives, keyboards, scanners, and binary digit. through signed certificates, managing certificate serial numbers, and certificate
Secure Sockets Layer (SSL) cameras. revocation.
A security protocol that provides communication privacy. SSL enables client Bits Per Second (BPS)
and server applications to communicate in a way that is designed to prevent VoIP (Voice over Internet Protocol) In digital communications, bandwidth is expressed in bits per second (bps). Client
eavesdropping, tampering, and message forgery. SSL was developed by Net- A method for sending voice over a LAN, a WAN, or the Internet using TCP/IP The number of bits transmitted every second, used as a measure of the speed Any computer or program connecting to, or requesting the services of, another
scape Communications Corporation and RSA Data Security, Inc. packets. Users may be abl at which a device, such as a modem, can transfer data. computer or program. Client can also refer to the software that enables the com-
puter or program to establish the connection. For a local area network (LAN) or
Secure/Multipurpose Internet Mail Extensions (S/MIME) WAN (Wide area network) BitTorrent the Internet, a computer that uses shared network resources provided by another
An extension of MIME to support secure mail. It enables message originators to Connects networks in geographically diverse areas. Also see LAN definition. BitTorrent is a peer-to-peer file sharing (P2P) communications protocol. Bit- computer (called a server).
digitally sign email messages to provide proof of message origin and data integ- Torrent is a method of distributing large amounts of data widely without the
rity. It also enables messages to be transmitted in encrypted format to provide Web server original distributor incurring the entire costs of hardware, hosting and band- Control Key
confidential communications. A computer that is maintained by a system administrator or Internet service width resources. Using the BitTorrent protocol, recipients each supply data to Shortcuts for faster use of the computer including the Control (CTRL) and other
provider (ISP) and that responds to requests from a user's browser. newer recipients, reducing the cost and burden on any given individual source, keys to accomplish a specific task. For example, CTRL+F opens a search box.
Security group providing redundancy against system problems, and reducing dependence
A group that can be listed in discretionary access control lists (DACLs) used to WiFi upon the original distributor. Cookies
define permissions on resources and objects. A security group can also be used The acronym for wireless fidelity, a wireless networking 802.11-standard. A Internet sites use small text files called cookies to keep track of user preferences
as an email entity. Sending an email message to the group sends the message to Wi-Fi network can also be used to enable connectivity to a larger local area Blog and information. The web site automatically writes a cookie to the users hard
all the members of the group. network (LAN), wide area network (WAN), or the Internet. A short form of `web log' blogs are a frequent, chronological publication of drive so the site can recognize the user upon returning to the site.
personal thoughts and web links. There are thousands of web sites where peo-
Security host ple can establish a blog at no charge. Once thought of only as a “personal Dial-up Connection
An authentication device, supplemental to standard Windows and remote access diary” it has expanded into the business and political arenas. Such specialized Connection to Internet using plain old telephone service (POTS) and a modem.
server security, that verifies whether a caller from a remote client is authorized search engines as Blogdigger, Bloglines and Google Blog Search may yield
to connect to the remote access server. Derived from authoritative sources by David Vine better results compared to a traditional web search. Digital signature
A means for originators of a message, file, or other digitally encoded informa-
Serial port Bluetooth tion to bind their identity to the information. The process of digitally signing
An interface on the computer that allows asynchronous transmission of data David Vine Associates, LLC A short-range radio technology for Internet and mobile devices, aimed at sim- information entails transforming the information, as well as some secret infor-
characters one bit at a time. Also called a communication or COM port. 963 Dougherty Road plifying communications among them. A device such as a cellular phone, mation held by the sender, into a tag called a signature. Digital signatures are
Aiken, SC 29803 printer, keyboard, mouse, or computer that has a Bluetooth radio to replace used in public key environments, and they provide nonrepudiation and integrity
Server 803-649-1184 cables connecting those devices. services.
In general, a computer that provides shared resources to network users.
Bridge Digital Subscriber Line (DSL)
Shareware A device that connects two LANs (local-area networks) or two segments of A type of high-speed Internet connection using standard telephone wires. This
This term refers to software available on public networks. Users can download the same LAN. Unlike routers, bridges are protocol-independent. They simply is also referred to as a broadband connection.
software from a variety of web sites (Tucows.com was one of the first, forward packets without analyzing and re-routing messages.
Download.com is another) and use the fully functional software for a trial pe- Discussion group
riod. After the trial to continue using the software the user must register and pay Broadband An email list community where members can obtain and share information.
for the product. Broadband connections are typically 256 kilobytes per second (KBPS) or
faster. Broadband includes DSL and cable modem service. Domain name
Signature file This is the unique name that identifies an Internet site. Domain Names always
A short text file that email users can automatically append at the end of each Browser have at least two parts, which are separated by dots (for instance lsoft.com).
message they send. Commonly, signature files list the user's name, phone num- Software (e.g. Firefox, Internet Explorer, Opera, Sea Monkey) that interprets The part on the left is specific whereas the part on the right is more general.
ber, company, company URL, etc. HTML files, formats them into web pages, and displays them to the end user.
Some browsers also permit end users to send and receive email, read news- Domain Name System (DNS)
Simple Mail Transfer Protocol (SMTP) groups, and play sound or video files embedded in web documents. A hierarchical, distributed database that contains mappings of DNS domain
A protocol used to send email on the Internet. SMTP is a set of rules regarding names to various types of data, such as IP addresses. DNS enables the location
the interaction between a program sending email and a program receiving Browser Add-On of computers and services by user-friendly names, and domain owner informa-
email. Also known as Extensions, these supplementary programs add new functional- tion stored in the database.
ity, from toolbars button to a completely new feature.
Spam Download
Also known as unsolicited commercial email (UCE) it is unwanted, unsolicited Bytes To transfer a copy of a file from an Internet server to one's own computer.
junk email to a large number of recipients. Many programs are available to help A unit of data that typically holds a single character, such as a letter, a digit, or
diminish the flow of spam. Another tactic is to filter emails with certain key a punctuation mark. Some single characters can take up more than one byte. DVD
words (using the rules or filter function in email software) or filter out all Digital video disk, similar to a CD-ROM in appearance but holds 4.7 gigabytes
(single layer) or 8.5 gigabytes (dual layer). Most computers can read DVDs. Hyperlink Log file Opt-out
Many newer computers can write to them as well. Colored and underlined text or a graphic that you click to go to a file, a location A file that stores messages generated by an application, service, or operating Email marketing in which potential customers are included in email campaigns
in a file, an HTML page on the World Wide web, or an HTML page on an system. These messages are used to track the operations performed. For exam- or newsletters until they specifically request not to be subscribed any longer.
Dynamic Host Configuration Protocol (DHCP) intranet. ple, web servers maintain log files listing every request made to the server. Log This method is not recommended and may in some cases be illegal. Many of
A TCP/IP service provides a dynamic “leased” configuration of host IP ad- files are usually plain text (ASCII) files and often have a .log extension. Log these annoying emails will simply put you on another list when you opt-out of
dresses and distributes them to eligible network clients. DHCP provides safe, Hypertext Markup Language (HTML) files can be searched for on a computer simply by searching for all files with a . the mailing. The same is true with many junk faxes that provide automated opt-
reliable, and simple TCP/IP network configuration, prevents address conflicts, HTML files are ASCII text files with codes embedded to denote formatting and log extension. There can be hundreds of log files used for many different pur- out schemes.
and helps conserve the use of client IP addresses on the network. hypertext links all of which is interpreted as web pages by the browser. poses on a typical computer.
Out-of-office reply
Email Bounces Hypertext Transfer Protocol (HTTP) Megabyte (MB) Automatic reply message triggered by incoming email to a user's inbox, typi-
An automated electronic mail message from a mail system informing the sender The protocol used to transfer information on the World Wide web. An HTTP 1,048,576 bytes, though often interpreted as 1 million bytes. cally activated when users are on vacation or otherwise unavailable.
of another message about a delivery problem. The original message is said to address (one kind of Uniform Resource Locator [URL]) takes the form: http://.
have bounced. "Hard" bounces are caused by invalid email addresses, whereas Memory Packet
"soft" bounces are due to temporary conditions, such as overloaded inboxes. Icon Generally, temporary storage Random Access Mmemory (RAM) directly con- A packet is the unit of data that is routed between an origin and a destination on
An image representing an object that can be manipulated by the user. nected to the processor that depends on electrical power for retention of data. the Internet or any other packet-switched network. When any file (e-mail mes-
Email Error Codes Memory is often differentiated from computer storage (for example, hard disks, sage, HTML file, GIF file, URL request, etc.) is sent from one place to another
Reveals specific connection error(s) in SMTP sent mail and the reason why an Internet CD-ROMs, etc.) permanently stores data when the computer is turned off. on the Internet, the Transmission Control Protocol (TCP) layer of TCP/IP di-
email bounces. The SMTP protocol requires that an SMTP server provide noti- Interconnected Networks connected by routers. Packets of data are transferred vides the file into "chunks" of an efficient size for routing. Each of these pack-
fication of delivery failure, if it determines that a message cannot be delivered via fiber optic or satellite. Software recognizes various protocols so you can Modem (modulator/demodulator) ets is separately numbered and includes the Internet address of the destination.
to one or more recipients. More detail can be found in RFC 3461. view web pages and send email. A device that allows computer information to be transmitted and received over An Ethernet LAN typically will have a maximum transmission unit (MTU) of
a telephone line. The transmitting modem translates digital computer data into 1500; however, this may be lowered by a router.
Ethernet Internet address analog signals that can be carried over a phone line. The receiving modem
A standard for local area networks using twisted-pair cable. An Ethernet con- An address for a resource on the Internet that is used by web browsers. An translates the analog signals back to digital form. Also, nearly all modems have PCMCIA device
nection can carry data at 100 megabits per second (Mbps). Internet address typically starts with a protocol name (www.), followed by the fax transmission and reception capability. A removable device, approximately the size of a credit card, that can be inserted
name of the organization (investigativetechnology) that maintains the site and a into a PCMCIA slot in a usually in a laptop computer. PCMCIA devices can
File Transfer Protocol (FTP) suffix (.com, .edu., .net, etc.) Moderated list include modems, multimedia cards and WiFi cards.
A TCP/IP protocol used to copy files between two computers on the Internet. Moderators can forward all or some of the messages, received by the list
Internet Engineering Task Force (IETF) subscribers, to the email list if they want to. It is also possible for the moderator Port
Firewall An open community of network designers, operators, vendors, and researchers to perform several tasks such as editing and deleting messages. A moderated list A connection point on your computer where you can connect devices that pass
A combination of hardware and software that provides a security system, usu- concerned with the evolution of Internet architecture and the smooth operation thus puts the list owner in the equivalent position as an editor of a newspaper. data into and out of a computer. For example, a printer is typically connected to
ally to prevent unauthorized access from outside to an internal network or intra- of the Internet. Technical work is performed by working groups organized by a parallel port (also called an LPT port), and a modem is typically connected to
net. A firewall prevents direct communication between network and external topic areas (such as routing, transport, and security). Mozilla Firefox a serial port (also called a COM port).
computers by routing communication through a proxy server outside of the Mozilla Firefox is a freeware web browser developed by the Mozilla
network. The proxy server determines whether it is safe to let a file pass Internet Protocol (IP) Corporation, Sun Microsystems and a large community of external contributors. Private key
through to the network. A firewall is also called a security-edge gateway. A TCP/IP protocol responsible for IP addressing, routing and the fragmentation Firefox is a cross-platform browser, providing for Microsoft Windows, Mac The secret half of a cryptographic key pair that is used with a public key algo-
and reassembly of IP packets. OS, and Linux. Thunderbird is the email freeware that many people use in rithm. Private keys are typically used to decrypt a symmetric session key, digi-
Forum conjunction with Firefox. tally sign data, or decrypt data that has been encrypted with the corresponding
An online discussion group, where participants with common interests can ex- Internet service provider (ISP) public key.
change open messages. Broadly speaking this could include blogs with com- A company that provides individuals or companies access to the Internet. An Name resolution
ment capability, message boards and Usenet Newsgroup. ISP provides a telephone number, a user name, a password, and other connec- The process of having software translate between names that are easy for users Privacy policy
tion information so users can connect their computers to the ISP's computers. to work with and numerical IP addresses, which are difficult for users but A web site's privacy policy tells you what kind of information the web site col-
Freeware An ISP typically charges a monthly fee. necessary for TCP/IP communications. Name resolution is provided by DNS. lects, to whom it gives that information, and how it uses the information. Per-
A free computer program made available on the Internet. Authors have various sonally identifiable information is information that can be used to identify or
motivations ranging from exhibiting their skill to selling another version of the Intranet Network adapter contact you, such as your name, email address, home or work address, or tele-
program with more features. A network within an organization that uses Internet technologies and protocols, A device and appropriate software that connects your computer to a network via phone number. However, a web site only has access to the personally identifi-
but is available only to certain people, such as employees of a company. An Ethernet cable, PCMCIA card or WiFi. able information that you provide, or to the choices you make while visiting a
Gateway intranet is also called a private network. web site. See also cookies definition.
A hardware or software set-up that functions as a translator between two dis- Network News Transfer Protocol (NNTP)
similar protocols. A gateway can also be the term to describe any mechanism IP address A TCP/IP protocol used to distribute network news messages to NNTP servers Protocol
providing access to another system. A 32-bit address used to identify a node on a network. Each node on the IP and clients (newsreaders built into Outlook, Thunderbird, etc.) on the Internet. A set of rules and conventions for sending information over a network. These
network must be assigned a unique IP address, which is made up of the network NNTP is designed so that news articles are stored on a server in a central data- rules govern the content, format, timing, sequencing, and error control of mes-
Gigabyte (GB) ID, plus a unique host ID. This address is typically represented with four num- base, thus enabling a user to select specific items to read. There are approxi- sages exchanged among network devices.
1,024 megabytes, though often interpreted as approximately one billion bytes. bers separated by a period (for example, 192.168.7.27). The current version mately 150,000 worldwide Usenet Newsgroups. A substantial archive is owned
(known as IP version 4 or IPv4) has not been substantially changed since RFC by Google and can be searched there. Public key cryptography
GNU 791 was published in 1981. The IETF has developed IP version 6 (IPv6). This A method of cryptography in which two different keys are used: a public key
GNU stands for “GNU's Not Unix.” The GNU Project was conceived in 1983 new version allow for many, many more addresses. The size of an address in Network protocol for encrypting data and a private key for decrypting data. Public key cryptogra-
as a way of bringing back the cooperative spirit from earlier days. IPv6 is 128 bits, four times larger than an address in IPv4. It allows for The language a computer uses to communicate over a network. For a computer phy is also called asymmetric cryptography.
340,282,366,920,938,463,463,374,607,431,768,211,456 (3.4 × 1038) possible to communicate with another computer, they both must use the same protocol.
Hard disk addresses. Random Access Memory (RAM)
Contains one or more inflexible platters coated with material in which data can Node Memory that can be read from or written to by a computer or other devices.
be recorded magnetically with read/write heads. The hard disk exists in a sealed Kilobyte (KB) Any device (PCs, servers, and printers) connected to a network. Information stored in RAM is lost when the computer is turned off. See also
case that protects it and allows the head to fly 10 millionths to 25 millionths of 1,024 bytes, though often interpreted as 1,000 bytes. memory definition.
an inch above the surface of a platter. Generally ranges upward from 40 giga- Operating system
bytes of data storage capability. LISTSERV A program such as Linux or Windows that manages all other programs in a Request for Comments (RFC)
Software to create discussion lists that allow for ongoing discussions among computer. An official document of the Internet Engineering Task Force (IETF) that speci-
Host members, with or without moderation. Most people use the term LISTSERV to fies the details for protocols included in the TCP/IP family.
When a server acts as a host it means that other computers on the network do refer to any type of two-way email system. Unlike a one-way list, a discussion OpenOffice.Org
not have to download the software that this server carries. The site’s functional- list encourages interaction among members of a group (e.g. DVASEMINAR OpenOffice is a freeware replacement for Microsoft Office and is fully com- Router
ity comes from software on the host computer. Yahoo Group). Every member can write to the list, and in doing so, everyone patible with MS Office and many other brands of software. It is a suite of inte- Hardware that helps LANs and WANs achieve interoperability and connec-
will receive a copy of the message. Lists can be moderated to insure quality. grated programs including word processor, spreadsheet, presentation, database, tivity, and can link LANs that have different network topologies. Routers match
Host name drawing and mathematical capabilities. packet headers to a LAN segment and choose the best path for the packet, opti-
The DNS name of a device on a network. These names are used to locate a Local area network (LAN) mizing network performance.
computer on a network or Internet. To find another computer, its host name A communications network connecting a group of computers, printers, and Opt-in
must either appear in the Hosts file or be known by a DNS server other devices located within a relatively limited area (for example, a building). An approach to email marketing in which customers must explicitly request to Routing
A LAN allows any connected device to interact with any other on the network. be included in an email campaign or newsletter. The process of forwarding packets through an network from a source host to a
destination host. Routing directs forwarding, the passing of logically addressed
(single layer) or 8.5 gigabytes (dual layer). Most computers can read DVDs. Hyperlink Log file Opt-out
Many newer computers can write to them as well. Colored and underlined text or a graphic that you click to go to a file, a location A file that stores messages generated by an application, service, or operating Email marketing in which potential customers are included in email campaigns
in a file, an HTML page on the World Wide web, or an HTML page on an system. These messages are used to track the operations performed. For exam- or newsletters until they specifically request not to be subscribed any longer.
Dynamic Host Configuration Protocol (DHCP) intranet. ple, web servers maintain log files listing every request made to the server. Log This method is not recommended and may in some cases be illegal. Many of
A TCP/IP service provides a dynamic “leased” configuration of host IP ad- files are usually plain text (ASCII) files and often have a .log extension. Log these annoying emails will simply put you on another list when you opt-out of
dresses and distributes them to eligible network clients. DHCP provides safe, Hypertext Markup Language (HTML) files can be searched for on a computer simply by searching for all files with a . the mailing. The same is true with many junk faxes that provide automated opt-
reliable, and simple TCP/IP network configuration, prevents address conflicts, HTML files are ASCII text files with codes embedded to denote formatting and log extension. There can be hundreds of log files used for many different pur- out schemes.
and helps conserve the use of client IP addresses on the network. hypertext links all of which is interpreted as web pages by the browser. poses on a typical computer.
Out-of-office reply
Email Bounces Hypertext Transfer Protocol (HTTP) Megabyte (MB) Automatic reply message triggered by incoming email to a user's inbox, typi-
An automated electronic mail message from a mail system informing the sender The protocol used to transfer information on the World Wide web. An HTTP 1,048,576 bytes, though often interpreted as 1 million bytes. cally activated when users are on vacation or otherwise unavailable.
of another message about a delivery problem. The original message is said to address (one kind of Uniform Resource Locator [URL]) takes the form: http://.
have bounced. "Hard" bounces are caused by invalid email addresses, whereas Memory Packet
"soft" bounces are due to temporary conditions, such as overloaded inboxes. Icon Generally, temporary storage Random Access Mmemory (RAM) directly con- A packet is the unit of data that is routed between an origin and a destination on
An image representing an object that can be manipulated by the user. nected to the processor that depends on electrical power for retention of data. the Internet or any other packet-switched network. When any file (e-mail mes-
Email Error Codes Memory is often differentiated from computer storage (for example, hard disks, sage, HTML file, GIF file, URL request, etc.) is sent from one place to another
Reveals specific connection error(s) in SMTP sent mail and the reason why an Internet CD-ROMs, etc.) permanently stores data when the computer is turned off. on the Internet, the Transmission Control Protocol (TCP) layer of TCP/IP di-
email bounces. The SMTP protocol requires that an SMTP server provide noti- Interconnected Networks connected by routers. Packets of data are transferred vides the file into "chunks" of an efficient size for routing. Each of these pack-
fication of delivery failure, if it determines that a message cannot be delivered via fiber optic or satellite. Software recognizes various protocols so you can Modem (modulator/demodulator) ets is separately numbered and includes the Internet address of the destination.
to one or more recipients. More detail can be found in RFC 3461. view web pages and send email. A device that allows computer information to be transmitted and received over An Ethernet LAN typically will have a maximum transmission unit (MTU) of
a telephone line. The transmitting modem translates digital computer data into 1500; however, this may be lowered by a router.
Ethernet Internet address analog signals that can be carried over a phone line. The receiving modem
A standard for local area networks using twisted-pair cable. An Ethernet con- An address for a resource on the Internet that is used by web browsers. An translates the analog signals back to digital form. Also, nearly all modems have PCMCIA device
nection can carry data at 100 megabits per second (Mbps). Internet address typically starts with a protocol name (www.), followed by the fax transmission and reception capability. A removable device, approximately the size of a credit card, that can be inserted
name of the organization (investigativetechnology) that maintains the site and a into a PCMCIA slot in a usually in a laptop computer. PCMCIA devices can
File Transfer Protocol (FTP) suffix (.com, .edu., .net, etc.) Moderated list include modems, multimedia cards and WiFi cards.
A TCP/IP protocol used to copy files between two computers on the Internet. Moderators can forward all or some of the messages, received by the list
Internet Engineering Task Force (IETF) subscribers, to the email list if they want to. It is also possible for the moderator Port
Firewall An open community of network designers, operators, vendors, and researchers to perform several tasks such as editing and deleting messages. A moderated list A connection point on your computer where you can connect devices that pass
A combination of hardware and software that provides a security system, usu- concerned with the evolution of Internet architecture and the smooth operation thus puts the list owner in the equivalent position as an editor of a newspaper. data into and out of a computer. For example, a printer is typically connected to
ally to prevent unauthorized access from outside to an internal network or intra- of the Internet. Technical work is performed by working groups organized by a parallel port (also called an LPT port), and a modem is typically connected to
net. A firewall prevents direct communication between network and external topic areas (such as routing, transport, and security). Mozilla Firefox a serial port (also called a COM port).
computers by routing communication through a proxy server outside of the Mozilla Firefox is a freeware web browser developed by the Mozilla
network. The proxy server determines whether it is safe to let a file pass Internet Protocol (IP) Corporation, Sun Microsystems and a large community of external contributors. Private key
through to the network. A firewall is also called a security-edge gateway. A TCP/IP protocol responsible for IP addressing, routing and the fragmentation Firefox is a cross-platform browser, providing for Microsoft Windows, Mac The secret half of a cryptographic key pair that is used with a public key algo-
and reassembly of IP packets. OS, and Linux. Thunderbird is the email freeware that many people use in rithm. Private keys are typically used to decrypt a symmetric session key, digi-
Forum conjunction with Firefox. tally sign data, or decrypt data that has been encrypted with the corresponding
An online discussion group, where participants with common interests can ex- Internet service provider (ISP) public key.
change open messages. Broadly speaking this could include blogs with com- A company that provides individuals or companies access to the Internet. An Name resolution
ment capability, message boards and Usenet Newsgroup. ISP provides a telephone number, a user name, a password, and other connec- The process of having software translate between names that are easy for users Privacy policy
tion information so users can connect their computers to the ISP's computers. to work with and numerical IP addresses, which are difficult for users but A web site's privacy policy tells you what kind of information the web site col-
Freeware An ISP typically charges a monthly fee. necessary for TCP/IP communications. Name resolution is provided by DNS. lects, to whom it gives that information, and how it uses the information. Per-
A free computer program made available on the Internet. Authors have various sonally identifiable information is information that can be used to identify or
motivations ranging from exhibiting their skill to selling another version of the Intranet Network adapter contact you, such as your name, email address, home or work address, or tele-
program with more features. A network within an organization that uses Internet technologies and protocols, A device and appropriate software that connects your computer to a network via phone number. However, a web site only has access to the personally identifi-
but is available only to certain people, such as employees of a company. An Ethernet cable, PCMCIA card or WiFi. able information that you provide, or to the choices you make while visiting a
Gateway intranet is also called a private network. web site. See also cookies definition.
A hardware or software set-up that functions as a translator between two dis- Network News Transfer Protocol (NNTP)
similar protocols. A gateway can also be the term to describe any mechanism IP address A TCP/IP protocol used to distribute network news messages to NNTP servers Protocol
providing access to another system. A 32-bit address used to identify a node on a network. Each node on the IP and clients (newsreaders built into Outlook, Thunderbird, etc.) on the Internet. A set of rules and conventions for sending information over a network. These
network must be assigned a unique IP address, which is made up of the network NNTP is designed so that news articles are stored on a server in a central data- rules govern the content, format, timing, sequencing, and error control of mes-
Gigabyte (GB) ID, plus a unique host ID. This address is typically represented with four num- base, thus enabling a user to select specific items to read. There are approxi- sages exchanged among network devices.
1,024 megabytes, though often interpreted as approximately one billion bytes. bers separated by a period (for example, 192.168.7.27). The current version mately 150,000 worldwide Usenet Newsgroups. A substantial archive is owned
(known as IP version 4 or IPv4) has not been substantially changed since RFC by Google and can be searched there. Public key cryptography
GNU 791 was published in 1981. The IETF has developed IP version 6 (IPv6). This A method of cryptography in which two different keys are used: a public key
GNU stands for “GNU's Not Unix.” The GNU Project was conceived in 1983 new version allow for many, many more addresses. The size of an address in Network protocol for encrypting data and a private key for decrypting data. Public key cryptogra-
as a way of bringing back the cooperative spirit from earlier days. IPv6 is 128 bits, four times larger than an address in IPv4. It allows for The language a computer uses to communicate over a network. For a computer phy is also called asymmetric cryptography.
340,282,366,920,938,463,463,374,607,431,768,211,456 (3.4 × 1038) possible to communicate with another computer, they both must use the same protocol.
Hard disk addresses. Random Access Memory (RAM)
Contains one or more inflexible platters coated with material in which data can Node Memory that can be read from or written to by a computer or other devices.
be recorded magnetically with read/write heads. The hard disk exists in a sealed Kilobyte (KB) Any device (PCs, servers, and printers) connected to a network. Information stored in RAM is lost when the computer is turned off. See also
case that protects it and allows the head to fly 10 millionths to 25 millionths of 1,024 bytes, though often interpreted as 1,000 bytes. memory definition.
an inch above the surface of a platter. Generally ranges upward from 40 giga- Operating system
bytes of data storage capability. LISTSERV A program such as Linux or Windows that manages all other programs in a Request for Comments (RFC)
Software to create discussion lists that allow for ongoing discussions among computer. An official document of the Internet Engineering Task Force (IETF) that speci-
Host members, with or without moderation. Most people use the term LISTSERV to fies the details for protocols included in the TCP/IP family.
When a server acts as a host it means that other computers on the network do refer to any type of two-way email system. Unlike a one-way list, a discussion OpenOffice.Org
not have to download the software that this server carries. The site’s functional- list encourages interaction among members of a group (e.g. DVASEMINAR OpenOffice is a freeware replacement for Microsoft Office and is fully com- Router
ity comes from software on the host computer. Yahoo Group). Every member can write to the list, and in doing so, everyone patible with MS Office and many other brands of software. It is a suite of inte- Hardware that helps LANs and WANs achieve interoperability and connec-
will receive a copy of the message. Lists can be moderated to insure quality. grated programs including word processor, spreadsheet, presentation, database, tivity, and can link LANs that have different network topologies. Routers match
Host name drawing and mathematical capabilities. packet headers to a LAN segment and choose the best path for the packet, opti-
The DNS name of a device on a network. These names are used to locate a Local area network (LAN) mizing network performance.
computer on a network or Internet. To find another computer, its host name A communications network connecting a group of computers, printers, and Opt-in
must either appear in the Hosts file or be known by a DNS server other devices located within a relatively limited area (for example, a building). An approach to email marketing in which customers must explicitly request to Routing
A LAN allows any connected device to interact with any other on the network. be included in an email campaign or newsletter. The process of forwarding packets through an network from a source host to a
destination host. Routing directs forwarding, the passing of logically addressed
Internet Glossary
packets from their source toward their ultimate destination through intermediary emails with country codes in the sender’s address including .cn, .tw, .ru etc. American Standard Code for Information Interchange (ASCII) Cable modem
nodes; typically hardware devices called routers, bridges, gateways, firewalls or A standard single-byte character encoding scheme used for text-based data. A device that enables a broadband connection to the Internet by using cable
switches. Ordinary computers with multiple network cards can also forward Streaming media ASCII uses designated 7-bit or 8-bit number combinations to represent either television infrastructure. Access speeds vary greatly, with a maximum through-
packets and perform routing, though with more limited functionality and per- Audio and video files transmitted on the Internet in a continuous fashion. 128 or 256 possible characters. put of 10 megabits per second (Mbps).
formance. The routing process usually directs forwarding on the basis of rout-
ing tables which maintain a record of the routes to various network destinations. Terabyte ASP CD-ROM
Thus constructing routing tables, which are held in the routers' memory, be- 1,024 gigabytes. Often interpreted as approximately 1 trillion bytes. Application Service Provider - A company that offers organizations access Compact disk, read only memory optical disk storage that can hold approxi-
comes very important for efficient routing. over the Internet to applications and related services that would otherwise mately 700 MB of data. Most computers read and write to these disks making
Transmission Control Protocol/Internet Protocol (TCP/IP) have to be located on site at the organization's premises. ROM a somewhat outdated portion of the term.
Routing Table A set of networking protocols that enable seamless communications across
An electronic file or database that is stored in a router or a networked computer. interconnected networks of computers with diverse hardware architectures and Attachment Certificate
The routing table stores the routes (and in some cases, metrics associated with various operating systems. TCP/IP includes standards for how computers com- An audio, video or other data file that is attached to an email message. A digital document that is commonly used for authentication and secure ex-
those routes) to a particular network destination. This information contains the municate and conventions for connecting networks and routing traffic. change of information on open networks. A certificate involves public and pri-
topology of the network immediately around it. It is used to direct forwarding Autoresponder vate encryption keys. Certificates are digitally signed by the issuing certifica-
of packets by matching destination addresses in a packet to the network paths in Uniform Resource Locator (URL) A computer program that automatically responds with a prewritten message to tion authority. Transparent to the user, the only sign of it being in use may be
routing table used to reach them. The construction of routing table is the pri- An address that uniquely identifies a location on the Internet. A URL for a anyone who sends an email message to a particular email address or uses an HTTPS:// in the URL. Certificates were created by Netscape Communications
mary goal of routing protocols. World Wide web site is preceded with http://. A URL can contain more detail, online feedback form. Corporation. It released a web browser called Mosaic Netscape 0.9 on October
such as the name of a page of hypertext, usually identified by the file name 13, 1994.
Screen fonts extension .html or .htm. Also see Internet Address definition. Bit (binary digit)
A typeface designed for display on a computer monitor screen. Other fonts may The smallest unit of information handled by a computer. One bit expresses a 1 Certification Authority
be installed for non-Latin language characters. You can select these fonts using Universal Serial Bus (USB) or a 0 in a binary numeral, or a true or false logical condition. A group of 8 An entity responsible for establishing and vouching for the authenticity of pub-
character encoding in the browser. This function is accessed from the pull-down Using USB, you can connect and disconnect devices without shutting down or bits makes up a byte, which can represent many types of information, such as lic keys belonging to users or other certification authorities. Activities of a certi-
menus. restarting your computer. You can use a single connect many peripheral de- a letter of the alphabet, a decimal digit, or other character. Bit is also called fication authority can include binding public keys to distinguished names
vices, including speakers, telephones, DVD drives, keyboards, scanners, and binary digit. through signed certificates, managing certificate serial numbers, and certificate
Secure Sockets Layer (SSL) cameras. revocation.
A security protocol that provides communication privacy. SSL enables client Bits Per Second (BPS)
and server applications to communicate in a way that is designed to prevent VoIP (Voice over Internet Protocol) In digital communications, bandwidth is expressed in bits per second (bps). Client
eavesdropping, tampering, and message forgery. SSL was developed by Net- A method for sending voice over a LAN, a WAN, or the Internet using TCP/IP The number of bits transmitted every second, used as a measure of the speed Any computer or program connecting to, or requesting the services of, another
scape Communications Corporation and RSA Data Security, Inc. packets. Users may be abl at which a device, such as a modem, can transfer data. computer or program. Client can also refer to the software that enables the com-
puter or program to establish the connection. For a local area network (LAN) or
Secure/Multipurpose Internet Mail Extensions (S/MIME) WAN (Wide area network) BitTorrent the Internet, a computer that uses shared network resources provided by another
An extension of MIME to support secure mail. It enables message originators to Connects networks in geographically diverse areas. Also see LAN definition. BitTorrent is a peer-to-peer file sharing (P2P) communications protocol. Bit- computer (called a server).
digitally sign email messages to provide proof of message origin and data integ- Torrent is a method of distributing large amounts of data widely without the
rity. It also enables messages to be transmitted in encrypted format to provide Web server original distributor incurring the entire costs of hardware, hosting and band- Control Key
confidential communications. A computer that is maintained by a system administrator or Internet service width resources. Using the BitTorrent protocol, recipients each supply data to Shortcuts for faster use of the computer including the Control (CTRL) and other
provider (ISP) and that responds to requests from a user's browser. newer recipients, reducing the cost and burden on any given individual source, keys to accomplish a specific task. For example, CTRL+F opens a search box.
Security group providing redundancy against system problems, and reducing dependence
A group that can be listed in discretionary access control lists (DACLs) used to WiFi upon the original distributor. Cookies
define permissions on resources and objects. A security group can also be used The acronym for wireless fidelity, a wireless networking 802.11-standard. A Internet sites use small text files called cookies to keep track of user preferences
as an email entity. Sending an email message to the group sends the message to Wi-Fi network can also be used to enable connectivity to a larger local area Blog and information. The web site automatically writes a cookie to the users hard
all the members of the group. network (LAN), wide area network (WAN), or the Internet. A short form of `web log' blogs are a frequent, chronological publication of drive so the site can recognize the user upon returning to the site.
personal thoughts and web links. There are thousands of web sites where peo-
Security host ple can establish a blog at no charge. Once thought of only as a “personal Dial-up Connection
An authentication device, supplemental to standard Windows and remote access diary” it has expanded into the business and political arenas. Such specialized Connection to Internet using plain old telephone service (POTS) and a modem.
server security, that verifies whether a caller from a remote client is authorized search engines as Blogdigger, Bloglines and Google Blog Search may yield
to connect to the remote access server. Derived from authoritative sources by David Vine better results compared to a traditional web search. Digital signature
A means for originators of a message, file, or other digitally encoded informa-
Serial port Bluetooth tion to bind their identity to the information. The process of digitally signing
An interface on the computer that allows asynchronous transmission of data David Vine Associates, LLC A short-range radio technology for Internet and mobile devices, aimed at sim- information entails transforming the information, as well as some secret infor-
characters one bit at a time. Also called a communication or COM port. 963 Dougherty Road plifying communications among them. A device such as a cellular phone, mation held by the sender, into a tag called a signature. Digital signatures are
Aiken, SC 29803 printer, keyboard, mouse, or computer that has a Bluetooth radio to replace used in public key environments, and they provide nonrepudiation and integrity
Server 803-649-1184 cables connecting those devices. services.
In general, a computer that provides shared resources to network users.
Bridge Digital Subscriber Line (DSL)
Shareware A device that connects two LANs (local-area networks) or two segments of A type of high-speed Internet connection using standard telephone wires. This
This term refers to software available on public networks. Users can download the same LAN. Unlike routers, bridges are protocol-independent. They simply is also referred to as a broadband connection.
software from a variety of web sites (Tucows.com was one of the first, forward packets without analyzing and re-routing messages.
Download.com is another) and use the fully functional software for a trial pe- Discussion group
riod. After the trial to continue using the software the user must register and pay Broadband An email list community where members can obtain and share information.
for the product. Broadband connections are typically 256 kilobytes per second (KBPS) or
faster. Broadband includes DSL and cable modem service. Domain name
Signature file This is the unique name that identifies an Internet site. Domain Names always
A short text file that email users can automatically append at the end of each Browser have at least two parts, which are separated by dots (for instance lsoft.com).
message they send. Commonly, signature files list the user's name, phone num- Software (e.g. Firefox, Internet Explorer, Opera, Sea Monkey) that interprets The part on the left is specific whereas the part on the right is more general.
ber, company, company URL, etc. HTML files, formats them into web pages, and displays them to the end user.
Some browsers also permit end users to send and receive email, read news- Domain Name System (DNS)
Simple Mail Transfer Protocol (SMTP) groups, and play sound or video files embedded in web documents. A hierarchical, distributed database that contains mappings of DNS domain
A protocol used to send email on the Internet. SMTP is a set of rules regarding names to various types of data, such as IP addresses. DNS enables the location
the interaction between a program sending email and a program receiving Browser Add-On of computers and services by user-friendly names, and domain owner informa-
email. Also known as Extensions, these supplementary programs add new functional- tion stored in the database.
ity, from toolbars button to a completely new feature.
Spam Download
Also known as unsolicited commercial email (UCE) it is unwanted, unsolicited Bytes To transfer a copy of a file from an Internet server to one's own computer.
junk email to a large number of recipients. Many programs are available to help A unit of data that typically holds a single character, such as a letter, a digit, or
diminish the flow of spam. Another tactic is to filter emails with certain key a punctuation mark. Some single characters can take up more than one byte. DVD
words (using the rules or filter function in email software) or filter out all Digital video disk, similar to a CD-ROM in appearance but holds 4.7 gigabytes

Das könnte Ihnen auch gefallen