|
 |
Aucune traduction en français n'existe pour cette page. En dessous se trouve le même texte dans la langue par defaut.Glossary of terms
 |
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| |
 |
A |
| :-) |
Smiley: The official term for this is "emoticon".
Emoticons are used to convey emotion in an text based world. The
idea
is to tilt your head to the left 90 degrees and it looks like a
smiley
face. You're bound to encounter an endless number of variations on
the theme.
|
| Active-X |
Microsoft concept that allows a program to
run
inside a web page.
|
| 10BaseT |
A 10-Mb/s baseband Ethernet specification
using
two pairs of twisted-pair cabling (Category 3, 4, or 5): one pair
for
transmitting data and the other for receiving data. 10BaseT (part
of
the IEEE 802.3 specification) has a distance limit of
approximately
328 feet (100 meters) per segment.
|
| 100BaseTX |
A 100-Mb/s baseband Fast Ethernet
specification
using two pairs of either unshielded twisted pair (UTP) or
shielded
twisted pair (STP) wiring. The first pair of wires is used to
receive
data; the second pair is used to transmit. To guarantee proper
signal
timing, a 100BaseTX segment cannot exceed 328 feet (100 meters) in
length. 100BaseTX is based on the IEEE 802.3 standard.
|
| ADSL |
Asynchronous Digital Subscriber Line: High
speed
copper wire, with upload speeds of 6Mbps and download speeds of
640Kbps.
|
| Alias |
A name, usually short and easy to remember,
that
is translated into another name, usually long and difficult to
remember.
|
| Applet |
A small program that runs inside a web Browser.
|
| ASCII |
American Standard Code for Information
Interchange:
A standard character-to-number encoding widely used in the
computer
industry.
|
| Anonymous FTP |
Anonymous FTP allows a user to
retrieve
documents, files, programs and other archived data from anywhere
on
the Internet without having to establish a username and password.
By
using the special username of "anonymous" the network user will
bypass
local security checks and will have access to publicly accessible
files
on the remote system.
|
| APOP |
see Authentication Post Office Protocol
(APOP)
|
| AppleShare |
A file-sharing protocol in Apple system software that allows
sharing
of files and network services through a file server in the Apple
Macintosh
environment.
|
| Application |
A program that performs a function directly
for
a user. FTP, mail and Telnet clients are examples of
network
applications.
|
| Archie |
A system to automatically gather, index and serve information on
the
Internet.
See: Gopher, Wide Area Information
Servers.
|
| ASP |
Active Server Pages. A means of delivering dynamically-written
web
pages to web browsers on demand, according to a wide range of
possible
variables, such as user interaction from forms, the contents of a
database,
the type of browser used, etc. A Microsoft product, ASP works
closely
with VBScript, which does not work currently on Netscape. The
equivalent
Netscape products are JavaScript and LiveConnect.
|
| Authoring Package |
A type of layout or desktop-publishing package that permits the
design
of web pages without requiring knowledge of HTML. Examples include
Microsoft FrontPage, HotMetal, HotDog, VisualStudio, etc.
|
| Authentication Post Office Protocol
(APOP) |
Authentication POP is a challenge-response
authentication
scheme built on top of the standard POP protocol. APOP is designed
in a way that protects your password from being sent across the
network.
To keep your password safe, the server stores your password in a
file
on local disk. When your mail client connects to the APOP server,
a
magic string is sent back. That string contains a unique
identifier
for the current session based upon the process id (PID) and
current
time.
|
| Attachment |
A file (document, picture, sound, program)
included
with an e-mail.
|
 |
B |
| Backbone |
The top level in a hierarchical network. Sub
and transit networks which connect to the same backbone are
guaranteed
to be interconnected.
|
| Bandwidth |
Technically, the difference, in Hertz (Hz),
between
the highest and lowest frequencies of a transmission channel.
However,
as typically used, the amount of data that can be sent through a
given
communications circuit.
|
| Baud |
In common usage the baud rate of a modem is how many bits it can
send
or receive per second. Technically, baud is the number of times
per
second that the carrier signal shifts value - for example a 1200
bit-per-second
modem actually runs at 300 baud, but it moves 4 bits per baud (4 x
300 = 1200 bits per second). Modems are usually classed as running
at 33.6K or 56K this relates to the speed of data transfer
in
bits-per-second.
|
| Beta |
Software distributed for testing, while
still
in a developmental stage.
|
| Binary |
Base 2 numeral system. The two symbols used
are
'0' and '1'.
|
| Binary file |
Any file that is not plain ASCII text; e.g.
executable
files, graphic files and compressed archive files.
|
| Binhex |
A method of encoding data, mostly used by
Macs.
|
| Bit |
(Binary DigIT) -- A single digit number in base-2, in other
words,
either a 1 or a zero. The smallest unit of computerized data.
Bandwidth
is usually measured in bits-per-second.
|
| Bounce |
The return of a piece of mail because of an
error
in the delivery process. Mail can be bounced for various reasons.
"Bounce" can
also refer to the message indicating the error (informal usage).
|
| Bookmark |
A Netscape
method
for storing web addresses.
|
| Bps |
(Bits-Per-Second) -- A measurement of how fast data is moved from
one place to another. A 28.8 modem can move 28,800 bits per second
|
| Browser |
A Client program (software) that is used to look at various kinds
of Internet resources.
The best known browsers (often called web browsers)
are Microsoft
Internet Explorer and Netscape. Both
companies are currently shipping version 4 of their browsers and
working on version 5. The choice of browser is largely personal,
although many people stay with the browser supplied by their ISP
(Internet Service Provider), unaware that they have a choice.
Each
browser varies slightly in the abilities it has, the way it
displays
web pages, and the range of additional programs (plugins) it can
run. Both major browsers are free of charge and can be
downloaded
from the manufacturers web site, or obtained by using the
CDs
on the front of Internet and PC magazine covers.
The Version-4 browsers require large amounts of RAM and disk
space
to run well.
|
| Bug |
An error found in a computer program,
usually
during the developmental stages.
|
| Bulletin Board System (BBS) |
A computer, and associated hardware, which typically provide
electronic
messaging services, archives of files and any other services or
activities
of interest to the bulletin board system's operator. Many BBS's
are
currently operated by government, educational and research
institutions.
|
|
C |
| Cache |
This is the area of memory that stores
recent
information from your Browser, such as web
pages
you have been to in the recent past. For security reason, we
recommend
to purge your cache manually very often...
|
| CD-ROM |
Compact Disc-Read Only Memory. Storage
medium
for data.
|
| CGI |
A set of rules that describe how a Web
server
communicates with another application running on the same computer
and how the application (called a CGI program) communicates with
the
Web server. Any application can be a CGI program if it handles
input
and output according to the CGI standard.
See also: CGI-bin.
|
| CGI-bin |
Common Gateway Interface - Binary: The
directory
where all relevant cgi information is stored.
|
| Client |
A computer system or process that requests a
service of another computer system or process. A workstation
requesting
the contents of a file from a file Server is a client of the
file server.A Web Browser is a specific kind of Client that works
with
Web Servers.
|
| Cookie |
The most common meaning of "Cookie" on the Internet
refers
to a piece of information sent by a Web Server to a Web Browser
that
the Browser software is expected to save and to send back to the
Server
whenever the browser makes additional requests from the Server.
Cookies
might contain information such as login or registration
information,
online "shopping cart" information, user preferences,
etc.
They are used by programs like JavaScript and Active Server Pages
(ASP)
to manage dynamic web interactions.
Cookies do not read your hard drive and send your life story to
the
CIA, but they can be used to gather more information about a user
than
would be possible without them.
|
| Crack, [k] |
To break a program's security, integrity or
registration
system.
|
| Crash |
When a program or operating system fails to
respond
or causes other programs to malfunction.
|
| Cyberspace |
A term coined by William Gibson in his SF novel
Neuromancer(1984)
to describe the interconnected "world" of computers and the
society
that gathers around them.
|
 |
D |
Dialler |
A program which establishes and maintains your
connection to the Internet.
|
| Dialup |
A temporary connection between machines
established
with modems over a standard phone line.
|
| Download |
To transfer a copy of a file from the Internet
to your local machine.
|
| Domain Name |
The unique name that identifies an Internet
site.
Domain Names always have 2 or more parts, separated by dots. The
part
on the left is the most specific, and the part on the right is the
most
general. A given machine may have more than one Domain Name but a
given
Domain Name points to only one machine.
|
| DNS |
(Domain Name Service) A global distributed
network
of servers that look up the IP numbers of particular Internet
addresses
from their Domain Names. Every web address has to have a DNS server
that
knows where that address is, so that requests for web pages can be
sent
to the correct place.
|
| Dumb Terminal |
This is a computer that has no processing power of its own. It
simply
displays the output from a (usually) remote machine.
|
 |
E |
Electronic Mail
e-mail |
A system whereby a computer user can
exchange
messages with other computer users (or groups of users) via a
communications
network. Electronic mail is one of the most popular uses of the
Internet.
|
| Emoticon |
An ASCII glyph used to indicate an emotional
state, typically used in E-mail or Usenet messages. Although
originally
intended mostly as jokes, emoticons or some other explicit humor
indication
are virtually required under certain circumstances in high-volume
text-only
communication forums such as Usenet. The lack of verbal and visual
clues can otherwise cause what were intended to be humorous,
sarcastic,
ironic or otherwise non-serious comments to be badly
misinterpreted,
resulting in arguments and Flame wars.
|
| Encryption |
The transformation of data into a form
unreadable
by anyone without a secret decryption key. Its purpose is to
ensure
privacy by keeping the information hidden from anyone for whom it
is
not intended. In the area of security, encryption is the ciphering
of data by applying an algorithm to plain text to convert it into
cipher
text.
|
| Ethernet |
The most widely used local area network
(LAN)
technology. Standard Ethernet runs at 10 Mb/s, 100 Mb/s or 1000
Mb/s.
It balances speed, price, ease of installation and
availability.
|
| Extranet |
A network linking together a group of suppliers, user
communities,
etc., for the purposes of exchanging data using Internet tools
(web
browsers, servers, etc.) in a structured way, such as online
ordering
systems. A sort of Intranet shared between many sites and
organizations.
|
 |
F |
| FAQ |
Frequently Asked Questions. In its usual
context,
FAQ refers to collected answers to often-asked questions on Usenet
newsgroups. These are periodically posted to the newsgroups in
question.
|
| File sharing |
The public or private sharing of computer
data
or space in a network with various levels of access
privileges.
|
| File Transfer |
The copying of a file from one computer to
another
over a computer network.
|
| File Transfer Protocol (FTP) |
(File Transfer Protocol) -- A very common
method
of moving files between two Internet sites. FTP is a special way
to
login to another Internet site for the purposes of retrieving
and/or
sending files. There are many Internet sites that have established
publicly accessible repositories of material that can be obtained
using
FTP, by logging in using the account name anonymous, thus these
sites
are called anonymous ftp servers. Web browsers are normally able
to
do FTP, but people often use a separate FTP tool such as WS_Ftp to
do FTP transactions.
|
| Finger |
A program that displays information about a
particular
user, or all users, logged on the local system or on a remote
system.
|
| Firewall |
Any of several ways to protect a network
from
an untrusted host or network. Consists of mechanisms to block
network
traffic and mechanisms to permit network traffic.
|
| Flame |
A strong opinion or criticism of something,
usually
as a frank inflammatory statement, in an electronic mail message.
|
| FYI |
For Your Information
|
| FTP |
See: File Transfer Protocol
|
| FWIW |
For What It's Worth
|
 |
G |
| GIF |
Graphic Interchange Format. An image
compression
algorithm that facilitates the transfer of high quality images over
a
network. A GIF can be of any resolution but only has 8 bit (256)
colors.
One of the advantages of the GIF format is that it can hold multiple
images and so can be animated.
|
| Gigabyte |
A billion bytes(1024 Megabytes), which is
large
enough to hold 1,250 copies of Moby Dick.
|
| Gopher |
A distributed information service that makes
available
hierarchical collections of information across the Internet. Gopher
uses
a simple protocol that allows a single gopher client to access
information
from any accessible gopher server, providing the user with a single
"gopher
space" of information. The clients are generally text menu-based.
Public
domain versions of the client and server are available.
|
| GUI |
Graphical User Interface. A method of driving
software
through the use of windows, icons, menus and other graphic devices.
|
 |
H |
| Hacker |
A person who delights in having an intimate
understanding
of the internal workings of a system, computers and computer
networks
in particular. The term is often misused to mean a person who
willfully
causes damage to computer systems through this knowledge.
|
| Header |
The portion of a packet, preceding the actual
data,
containing source and destination addresses, error checking and
other
fields. A header is also the part of an electronic mail message
that
precedes the body of a message and contains information about the
message
originator and time stamp.
|
| Hit |
Each time someone visits a web site, it is
termed
a "hit". You can measure the success of a web site, depending on how
many hits it has received.
|
| Homepage |
This is the page that you set in your Browser to be the first
page
you visit each time you log onto the Internet.
|
| Hop |
When data is sent across the Internet it does
so
via a series of Hops, from one computer to another along the way
until
the destination is reached.
|
| Host |
A computer that allows users to communicate
with
other host computers on a network. Individual users communicate by
using client programs, such as
electronic
mail, Telnet and FTP.
|
| HTML |
See: HyperText Markup Language
|
| HTTP |
See: Hypertext Transfer Protocol
|
| Hypertext |
A link between one document and other, related
documents elsewhere in a collection. By clicking on a word or
picture
that has been highlighted on a computer screen, a user can skip
directly
to files related to that subject.
|
| Hypertext Markup Language |
The coding language used to create Hypertext
documents
for use on the World Wide Web. HTML looks a lot like old-fashioned
typesetting
code, where you surround a block of text with codes that indicate
how
it should appear, additionally, in HTML you can specify that a block
of text, or a word, is linked to another file on the Internet. HTML
files
are meant to be viewed using a World Wide Web browser, such as
Netscape
or Internet Explorer.
|
| Hypertext |
Generally, any text that contains links to other documents - words
or
phrases in the document that can be chosen by a reader and which
cause
another document to be retrieved and displayed.
|
| Hypertext Transfer Protocol |
The protocol for moving hypertext files across
the Internet. Requires a HTTP client program on one end, and an HTTP
server program on the other end. HTTP is the most important protocol
used in the World Wide Web (WWW).
|
 |
I |
| IMHO |
In My Humble Opinion
|
| Integrated Services Digital Network
(ISDN) |
Basically a way to move more data over existing regular phone
lines.
ISDN is rapidly becoming available to much of the USA and in most
markets
it is priced very comparably to standard analog phone circuits. It
can
provide speeds of roughly 128,000 bits-per-second over regular phone
lines. In practice, most people will be limited to 56,000 or 64,000
bits-per-second.
ISDN is more expensive to use than normal phone services and can
often
be configured to do more than just handle an Internet connection.
|
| Internet |
Strictly speaking, any network that uses IP (Internet Protocol). In
practise, The Internet is the global inter-network of servers,
routers
and user communities who share information and services using the
same
protocols, such as http, POP, FTP, IRC and many others.
It also refers to the largest network of computers in the world "The
Internet".
|
| Internet Address |
An IP address that uniquely identifies
a node on the Internet.
|
| Internet Protocol (IP) |
A network-layer protocol in the TCP/IP stack offering a
connectionless
internetwork service. IP provides features for addressing,
type-of-service
specification, fragmentation and reassembly, and security. IP is def
ined
in RFC 791.
|
| Internet Relay Chat (IRC) |
A protocol that allows users to converse with
others
in real time. IRC is structured as a network of servers, each of
which
accepts connections from client programs. See: Talk
|
| Intranet |
A private network inside a company or organization that uses the
same
kinds of software that you would find on the public Internet, but
that
is only for internal use. As the Internet has become more popular
many
of the tools used on the Internet are being used in private
networks,
for example, many companies have web servers that are available only
to employees. Any restricted group of web pages (for example, using
passwords)
can also be regarded as an Intranet.
|
| Image Map |
This is an image on a website that contains
multiple
links. Which link you follow depends on the area of the image you
click
on.
|
| IP address |
A 32-bit address assigned to hosts using Transmission Control
Protocol/
Internet Protocol (TCP/IP). An IP address belongs to one of five
classes
(A, B, C, D or E) and is written as four octets separated by periods
(for example, 192.168.10.10), also called the dotted decimal format.
Each address consists of a network number, an optional subnetwork
number
and a host number. The network and subnetwork numbers together are
used
for routing, while the host number is used to address an individual
host
within the network or subnetwork. A subnet mask is used to extract
network
and subnetwork information from the IP address. Also called an
Internet
address.
|
| IRC |
(Internet Relay Chat) -- Basically a huge multi-user live chat
facility.
There are a number of major IRC servers around the world which are
linked
to each other. Anyone can create a channel and anything that anyone
types
in a given channel is seen by all others in the channel. Private
channels
can (and are) created for multi-person conference calls.
|
| ISDN |
See: Integrated Services Digital
Network
|
| ISP |
(Internet Service Provider) -- An institution
that
provides access to the Internet in some form, usually for money.
ISPs
come in 2 main types standard ISPs who charge a fixed
monthly
fee and allow unlimited access and Online Service Providers
(OSPs)
who have a variable pricing model based on access time and offer
additional
online services unconnected to the Internet. Examples of OSPs
include
CompuServe, AOL and MSN and ISPs include Demon, PowerNet,
Easynet,
UUNet, etc. Most ISPs now offer Dial-up access as well as
ISDN,
Leased Line and other services.
|
 |
J |
| Java |
Java is a network-oriented programming
language
invented by Sun Microsystems that is specifically designed for
writing
programs that can be safely downloaded to any computer through the
Internet
and immediately run without fear of viruses or other harm to your
computer
or files. Using small Java programs (called "Applets"),
Web
pages can include functions such as animation, calculators, and
other
fancy tricks, which can slow pages down.
|
| JavaScript |
A programming language for the web that allows
the use of dynamic content display in web pages, for example, when a
user moves a mouse over a certain point on a web page, or when forms
are filled in. JavaScript works on both leading web browsers and is
therefore
popular with programmers. Despite the name, it is not closely
related
to Java this was marketing hype by Netscape, who created it.
|
| JPEG |
Graphic file format which some say is
preferred
by Net users as it has high compression, thus allowing faster
downloads.
.jpg is the file extension name for a JPEG file.
|
| Junk Mail |
Junk E-mail or Spam is unsolicited
e-mail
sent to your mailbox.
|
 |
K |
| Kill file |
Newsreader file into which you can enter
keywords
and e-mail addresses to stop unwanted articles.
|
| Kilobyte (or k, or kb) |
A thousand bytes. Actually, usually 1024
(2^10)
bytes
|
 |
L |
| LAN |
A high-speed, low-error data network covering
a
relatively small geographic area (up to a few thousand meters). A
LAN
connects workstations, peripherals, terminals and other devices in a
single building or other geographically limited area. LAN standards
specify
cabling and signaling at the physical and data link layers of the
Open
Systems Interconnection (OSI) model. Widely used LAN technologies
include
Ethernet, fiber distributed data interface (FDDI) and token ring.
See
also wide area network (WAN).
|
| Latency |
The amount of time it takes data to reach the
destination.
|
| Leased Line |
Refers to a phone line that is rented for
exclusive
24-hour, 7 -days-a-week use from your location to another location.
The
highest speed data connections require a leased line and this type
of
Internet connection is also used to run a web server.
|
| Linux |
A free version of UNIX, that due to its
operational
capabilities on multi-hardware platforms is becoming very popular.
|
 |
M |
| Mail Server |
A software program that distributes files or
information
in response to requests sent via E-mail.
|
| Meta-Tags |
Elements in a Web Page that allow Keywords or
phrases
to be hidden in the page and ignore by Browsers, but noticed and
indexed
by Search Engines.
|
| MIME |
See: Multipurpose Internet Mail
Extensions
|
| Mirror Site |
A hosted site that is a duplicate of the
original,
which is hosted somewhere else.
|
| Modem |
A MOdulator/DEModulator: A device that allows
one
computer to talk to another across a phone line by converting
analogue
to digital and vice versa.
Basically, modems do for computers what a telephone does for humans.
|
| Mpeg, mpg |
A compressed audio/video file format.
You can read this file with Quicktime
|
| Mp3 |
Audio only compression using the Mpeg format,
which
reduces file size by 12:1 without quality loss.
You can read this file with Quicktime
|
| Multipurpose Internet Mail Extensions
(MIME) |
An extension to Internet E-mail which provides the
ability to transfer non-textual data, such as graphics, audio and
video.
|
 |
N |
| Name server |
Host that translates domain names into IP
addresses.
|
| Netiquette |
A pun on "etiquette", referring to proper
behaviour
on a network.
|
| Network |
A series of computers linked together so that
they
may share resources.
|
| Network News Transfer Protocol (NNTP)
|
A protocol for the distribution, retrieval and
posting of Usenet articles through
high-speed
links available on the Internet.
|
| Netscape |
The company that makes its eponymously titled
browser.
You can download the last version here
|
| Newbie |
Slang term for a user who is new to the
Internet.
|
| Newsgroup |
The name for discussion groups on USENET, also known as News. There
are many thousands of newsgroups, such as alt.gardening.flowers or
rec.arts.books.tolkien
and millions of people participate in them. Some newsgroups are
local
or based on a particular organization, others are national or
global.
Many are awash with Spam and can be almost unusable as a result. The
search tool Dejanews (http://www.dejanews.com) is an easy way to get
to know the service.
|
| NNTP |
See: Network News Transfer Protocol
|
| Node |
Any single computer on a network. Can also be
referred
to as a host.
|
 |
O |
| Operating System (OS) |
This is the core software of your computer.
Common
systems are Windows, MacOS ,UNIX and LINUX.
|
 |
P |
| Packets |
The unit of data that is routed between an
origin
and a destination on the Internet or any other packet-switched
network.
The packet includes a header containing control information and
(usually)
user data. Packets are most often used to refer to network layer
units
of data.
Packets are sent individually and reassembled at the destination
into
the whole file.
|
| Patc |
An add-on to an existing program that fixes a
bug
or upgrades the program.
|
| PCMCIA |
Personal Computer Memory Card International
Assoc:
Small credit card sized devices designed with portable computers in
mind.
The most common of which is a modem card.
|
| Ping |
A program that sends an echo like trace to see
if a host is available.
|
| PGP |
See: Pretty Good Privacy
|
| Plug In |
A (usually small) piece of software that adds
features
to a larger piece of software. Common examples are plug-ins for the
Netscape® browser
and web server. Adobe Photoshop® also uses plug-ins. Plug-ins
enhance
the functionality of the main package.
|
| Point of Presence (POP) |
(1) Point of Presence. A Point of Presence usually means a city or
location
where a network can be connected to, often with dial up phone lines.
|
| Point-to-Point Protocol (PPP) |
The Point-to-Point Protocol provides a method
for
transmitting packets over serial point-to-point links.
|
| POP |
See: Post Office Protocol, Point of
Presence
|
| Port |
Generally the Input/Output device on the back
of
a computer. It can also be a number in a web address.
|
| Post Office Protocol (POP) |
A protocol designed to allow single user hosts
to read E-mail
from
a server. There are three versions: POP, POP2 and POP3. Later
versions
are not compatible with earlier versions.
|
| Postmaster |
The administrator responsible for resolving E-mail problems,
answering
queries about users and other related duties at a site.
|
| PPP |
See: Point-to-Point Protocol
|
| Pretty Good Privacy (PGP) |
A controversial freeware program created in
June,
1991 by Philip Zimmermann, PGP is designed to encrypt data for
security.
http://www.pgpi.org/
|
| Protocol |
A formal description of message formats and
the
rules two computers must follow to exchange those messages.
|
| PSTN |
Public Switched Telephone Network: The old
fashioned
telephone system.
|
 |
Q |
| QuickTime |
QuickTime is Apple's video/animation technology, also ported to
Windows.
It allows you to view movies on the Internet.
http://www.quicktime.com
|
| R |
| RAM |
Random Access Memory: Memory that can be used
at
random without the previous sections in the block being touched.
|
| Remote Login |
Operating on a remote computer, using a
protocol
over a computer network, as though locally attached.
|
| Robot |
A program that automates Net tasks such as
collating
search engine databases. Also called a Bot.
|
| ROFL |
Rolls on Floor Laughing
|
| ROM |
Read Only Memory: Information that once stored
in its given medium can only be read and not removed from that
storage.
|
| Router |
A computer at a junction which decides in what
direction the Packet of information
should
be sent.
|
 |
S |
| Script |
A list of commands that are carried out
without
any user transaction.
|
| SCSI |
Method used for attaching peripheral devices
to
a computer.
|
| Search Engine |
A web site that accumulates details of the
contents
of Web Pages in an index and then allows the searching of that index
by Internet users with Keywords, phrases and other methods. Well
known
examples like AltaVista, Yahoo and HotBot are
among the most heavily visited sites on the Internet and attract
large
amounts of on-site advertising revenue, which is how they are
financed.
|
Serial Line Internet Protocol
(SLIP or CSLIP) |
A protocol used to run IP over serial lines,
such
as telephone circuits or RS-232 cables, interconnecting two systems.
CSLIP indicates that compression is used with the SLIP protocol.
|
| Server |
A computer, or a software package, that provides a specific kind of
service to client software running on other computers. The term can
refer
to a particular piece of software, such as a WWW server, or to the
machine
on which the software is running, e.g. the mail server is down
today,
thats why e-mail isnt getting out. A single server
machine
could have several different server software packages running on it,
thus providing many different servers to clients on the network.
|
| Shell |
The user interface to an operating
environment.
UNIX has several, including the Bourne shell (sh), the C
shell
(csh), and the Korn shell (ksh).
|
| Signature |
The three or four line message at the bottom
of
an E-mail message or Usenet news article
identifying
the sender. Large signature files (over five lines) are considered
poor "netiquette".
|
Simple Mail Transfer
Protocol (SMTP) |
The TCP/IP standard protocol for transferring
electronic
mail messages from one machine to another. SMTP specifies how two
mail
systems interact and the format of control messages they exchange to
transfer mail.
|
| SLIP |
See: Serial Line IP
|
| SMTP |
See: Simple Mail Transfer Protocol
|
| Spam |
An inappropriate attempt to use a mailing list, or USENET or other
networked
communications facility as if it was a broadcast medium (which it is
not) by sending the same message to a large number of people who
didnt
ask for it. The term probably comes from a famous Monty Python skit
which
featured the word spam repeated over and over. E-mail spam can be
dealt
with to some extent by using Spaminator tools and
filters.
|
SSL
Secure Sockets Layer |
Secure Sockets Layer is a program layer created
by
Netscape Communications for managing the security of message
transmissions
in a network. Netscapes idea was that the programming for
keeping
your messages confidential ought to be contained in a program layer
between
higher-level protocols (such as HTTP or IMAP) and the TCP/IP layers of
the Internet. The sockets part of the term refers to the
sockets
method of passing data between a client and a server program in a
network
or between program layers in the same computer.
SSL allows an SSL-enabled server to authenticate itself to an
SSL-enabled
client, allows the client to authenticate itself to the server, and
allows
both machines to establish an encrypted connection.
These capabilities address fundamental concerns about communication
over
the Internet and other TCP/IP networks:
SSL server authentication allows a user to confirm the identity of a
server.
SSL-enabled client software can use standard techniques of public-key
cryptography
to check that a servers certificate and public ID are valid and have
been
issued by a certificate authority (CA) listed in the clients list of
trusted
CAs. This confirmation can be important if, for example, the user is sending
a credit card number over the network and wants to check the receiving
servers
identity.
SSL client authentication allows a server to confirm a users
identity.
Using the same techniques as those used for server authentication,
SSL-enabled
server software can check that a clients certificate and public ID are
valid and have been issued by a certificate authority (CA) listed in the
servers
list of trusted CAs.
This confirmation can be important if, for example, the server is a
bank
sending confidential financial information to a customer and wants to
check
the recipients identity.
an encrypted SSL connection requires all information sent between a
client
and a server to be encrypted by the sending software and decrypted by the
receiving
software, thus providing a high degree of confidentiality. Confidentiality
is
important for both parties to any private transaction. In addition, all data
sent over an encrypted SSL connection is protected with a mechanism for
detecting
tampering that is, for automatically determining whether the data has
been altered in transit. |
| Streaming |
A file (usually sound) delivered in Real-time
(as
it happens) rather than waiting for the whole file to download.
|
| Stuffit |
Mac compression format and program.(.sit
.hqx)
http://www.alladinsys.com
|
| Surfing |
Informal term for exploring the Internet (i.e.
"surfing
the 'net"). Most often used in reference to accessing sites on the
World
Wide Web.
|
 |
T |
| T-1 |
A leased line capable of moving a theoretical
1 Mb in 10 secs. Still
not fast enough for full screen motion video.
|
| T-3 |
A leased line theoretically capable of
carrying information fast enough
for full screen motion video.
(UniWeb.be uses a T3 server for
the
hosting)
|
| Talk |
A protocol which allows two people on remote
computers to communicate
in real-time.
See: Internet Relay Chat.
|
| TCP |
See: Transmission Control Protocol
(TCP)
|
| TCP/IP Protocol Suite |
(Transmission Control Protocol/Internet
Protocol) -- This is the suite
of protocols that defines the Internet. Originally designed for the
UNIX
operating system, TCP/IP software is now available for every major
kind
of computer operating system.
|
| Telnet |
The standard Internet protocol for remote
terminal connection service.
|
| Terminal |
A device that allows you to access information
stored on a remote
machine.
|
| Thread |
A series of articles on the same topic, in a
Usenet newsgroup.
|
The Internet Adapter
(TIA) |
A product that emulates a SLIP or PPP
connection over a serial line,
allowing shell users to run a SLIP/PPP session through a UNIX dialup
account.
|
| TIA |
Thanks in advance.
|
Transmission Control
Protocol (TCP) |
An Internet standard transport layer protocol.
It is connection-oriented
and stream-oriented, as opposed to UDP.
|
| Trumpet Winsock |
A Windows program that provides SLIP and PPP access.
|
 |
U |
| UDP |
See: User Datagram Protocol
|
Uniform Resource Locator
(URL) |
(Uniform Resource Locator) -- The standard way to give the address
of
any resource on the Internet that is part of the World Wide Web
(WWW).
The most common way to use a URL is to enter into a WWW browser
program,
such as Netscape, or Internet Explorer.
|
| UNIX |
A computer operating system (the basic
software running on a computer,
underneath things like word processors and spreadsheets). UNIX is one
of
the longest-established operating systems for powerful computers and
is
widely used in many different flavours for Internet servers, often in
conjunction
with Apache.
|
UNIX-to-UNIX CoPy
(UUCP) |
This was initially a program run under the
UNIX operating system that
allowed one UNIX system to send files to another UNIX system via
dialup
phone lines. Today, the term is more commonly used to describe the
large
international network which uses the UUCP protocol to pass news and
electronic
mail.
|
| URL |
See: Uniform Resource Locator
|
| USB |
A method of attaching peripherals to a
computer.
|
| Usenet |
A collection of thousands of topically named
newsgroups, the computers
which run the protocols and the people who read them and submit
Usenet
news articles. Not all Internet hosts subscribe to Usenet and not
all Usenet
hosts are on the Internet.
See: Network News Transfer
Protocol.
|
User Datagram Protocol
(UDP) |
An Internet standard transport layer protocol.
It is an unreliable,connectionless-oriented
delivery service as opposed to TCP.
|
| User ID |
A compression of "user identification"; the
userid
always proceeds the @ sign in an E-mail address.
|
| UUCP |
See: UNIX-to-UNIX Copy
|
| UUdecoding |
The restoration of uuencoded data to its
original form.
|
| UUencoding |
The conversion of binary data into a 7-bit
ASCII representation using
an encoding scheme. Originally implemented to enable users to send
such
data over UUCP, it is now used to send binary files such as graphics
files,
user application documents and programs through E-mail and on Usenet.
|
 |
V |
| Virus |
A program which replicates itself on computer
systems by incorporating
itself into other programs which are shared among computer systems.
|
| Virtual Memory |
Imaginary memory area for some Operating
Systems, its purpose is to enlarge
the actual working memory size.
|
| Virtual Private Networking |
Microsoft's private networking protocol.
|
Virtual site
Virtual host |
A virtual site consists of a Domain Name
System
(DNS) domain with Web, FTP and e-mail services. Each virtual site
contains its own list of site user accounts. Each site user account
has
its
own Web, e-mail spool and any number of e-mail aliases. The fully
qualified domain name of a virtual site is unique to that site,
while its
IP
address can be shared by many sites.
With the advent of name-based virtual hosting, it is no longer
necessary
to dedicate an IP address to a virtual site. Apache can now
differentiate
among target virtual sites according to the name requested. Many
virtual sites on the UniWeb Server can share one IP. Not all
services are
compatible with name-based virtual hosting. SSL encryption for web
data and an anonymous FTP account can only be enabled on one virtual
site per IP address hosted by theUniWeb Server.
The IP address of the UniWeb Server can be shared by many virtual
sites
or it can be unique to one virtual site.
The UniWeb Server has one main site (which by default cannot be
deleted)
and virtual sites. The main site uses the IP address assigned to the
UniWeb
Server.
|
| V90 |
The new modem standard that has brought an end
to the industry division
over the different 56k protocols.
|
 |
W |
| WAP |
(Wireless Application Protocol) is the
gateway
to a new world of mobile data. It provides a universal standard
which
enables users to easily access Web-based interactive information
services
and applications from the screens of their mobile phones.
As such, WAP is at the heart of Total Connectivity usage.
|
| .Wav |
Sound file format.
|
| Web Cam |
The web interface for displaying live
digital images.
|
Wide Area Information
Servers (WAIS) |
A commercial software package that allows
the indexing of huge quantities
of information, and then making those indices searchable across
networks
such as the Internet. A prominent feature of WAIS is that the
search
results are ranked (scored) according to how relevant the hits
are, and
that subsequent searches can find more stuff like that last batch
and
thus refine the search process.
|
| Winsock |
Winsock is a TCP/IP stack that allows you to
use your modem to send
data to/from the Internet. A Winsock interface is required for
Windows
Internet applications like Netscape, Eudora, Free Agent, and
many others.
Winsock allows true Internet networking via modem.
|
| Wizard |
A small program that will guide you through
a specific procedure;e.g.:
Installing a program onto your computer.
|
| Whois |
An Internet program which allows users to
query a database of people
and other Internet entities, such as domains, networks and hosts.
|
World Wide Web
(WWW or W3) |
(World Wide Web) - Two meanings - First,
loosely used: the whole constellation
of resources that can be accessed using Gopher, FTP, HTTP, telnet,
USENET,
WAIS and some other tools. Second, the universe of hypertext
servers
(HTTP servers) which allow text, graphics, sound files, etc. to be
requested
from, and delivered to, web browsers.
|
| WYSIWYG |
What You See Is
What You Get
|
 |
X |
| XML |
eXtensible Markup
Language is a markup language
for documents containing structured information..
|
| X2 |
One of the two 56k modem standards.
|
 |
Y |
| Yellow Pages (YP) |
A service used by UNIX administrators to
manage databases distributed
across a network. Now known as NIS (Network Information Services).
|
| Yahoo |
Quite possibly the Web's largest Internet
directory/ Search Engine.
|
|
 |
|