Articles
The Internet is a global system of interconnected computer networks that use the standard...
What is a Uniform Resource Locator (URL)?This Euler diagram shows that a Uniform Resource Identifier (URI) is either a...
¿Qué es un Identificador de Recursos Uniforme o URI?Un identificador de recursos uniforme o URI —del inglés uniform resource identifier— es una...
¿Qué es el Nombre de Recurso Uniforme o URN?El Nombre de Recurso Uniforme o URN (acrónimo inglés de Uniform Resource Name) funciona de...
What is the online advertising?Online advertising, also called online marketing or Internet advertising, is a form of...
What is Search Engine Optimization? (SEO)Search engine optimization (SEO) is the process of improving the visibility of a website or a web...
What is a domain name?A domain name is an identification string that defines a realm of administrative autonomy,...
What is link building?In the field of SEO (search engine optimization), link building describes actions aimed at...
What is domain registration?Domain registration is the process of acquiring a domain name from a domain name registrar....
What is DNS (Domain Name System)?The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services,...
What is a virtual private server (VPS)?A virtual private server (VPS) is a virtual machine sold as a service by an Internet hosting...
What is the Internet Protocol and the IP Address?The Internet Protocol (IP) is the principal communications protocol used for relaying datagrams...
What is the IPV6 Internet Protocol?Internet Protocol version 6 (IPv6) is a version of the Internet Protocol (IP). It is designed to...
What is the difference between host name and domain name?There is often confusion about what is a host name and what is a domain name. A domain name is...
What is a domain name transfer?A domain name transfer is the process of changing the designated registrar of a domain name....
In a domain name transfer, what is an EPP AUTH Code?Transfer secret is a domain transfer secret (transfer key), a key or code granted by all the...
What is a web application?A web application or web app is any software that runs in a web browser. It is created in a...
What is the electronic mail?Electronic mail, most commonly referred to as email or e-mail since 1993, is a method of...
What is the unsolicited email (spam)?Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic...
What is an MX record?A mail exchanger record (MX record) is a type of resource record in the Domain Name System that...
What is the web hosting?A web hosting service is a type of Internet hosting service that allows individuals and...
What is SiteBuilder and how to try it for free?Our SiteBuilder is an easy to use, scalable web application designed to create and manage...
What is the Apache HTTP Server?The Apache HTTP Server, commonly referred to as Apache, is a web server software program notable...
What is SHOUTcast (server for audio streaming)?SHOUTcast is cross-platform proprietary software for streaming media over the Internet. The...
What is the .htaccess file?A .htaccess (hypertext access) file is a directory-level configuration file supported by several...
What is the .htpasswd file?.htpasswd is a flat-file used to store usernames and password for basic authentication of Apache...
What is a Web Template?A web template is a tool used to separate content from presentation in web design, and for...
What is ECommerce?Electronic commerce, commonly known as e-commerce or e-comm, refers to the buying and selling of...
What is a cookie?A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is a small piece of data...
What is Information Technology (IT)?Information Technology (IT) is the branch of engineering that deals with the use of computers and...
What is Wi-Fi?Wi-FI Logo Wi-Fi or Wifi, is a mechanism for wirelessly connecting...
What is Cloud Computing?Cloud computing is the delivery of computing as a service rather than a product, whereby shared...
What is a "Social networking service"?A social networking service is a platform to build social networks or social relations among...
What is Social Media?Social media includes web-based and mobile technologies used to turn communication into...
What is 4G?In telecommunications, 4G is the fourth generation of mobile phone mobile communication...
What is a vulnerability?In computer security, a vulnerability is a weakness which allows an attacker to reduce a...
What is the malware?Malware, short for malicious software, is software used to disrupt computer operation, gather...
What is cyberbullying?Image left on victims of some Facebook profiles. Cyberbullying is the...
What is a computer virus?Hex dump of the Blaster virus, showing a message left for Microsoft CEO Bill...
What is an antivirus software?Antivirus or anti-virus software (usually written as the abbreviation AV) is software used to...
What is a computer worm?A computer worm is a standalone malware computer program that replicates itself in order to...
What is a Backdoor?A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal...
What is a Trojan horse?A Trojan horse, or Trojan, is a hacking program that is a non-self-replicating type of malware...
What is a firewall?An illustration of where a firewall would be located in a network. In...
What is a hacker?In the computer security context, a hacker is someone who seeks and exploits weaknesses in a...
What is a cracker?A cracker (also known as a black hat hacker) is an individual with extensive computer knowledge...
What is an Internet robot or bot?An Internet bot, also known as web robot, WWW robot or simply bot, is a software application...
What is a scraper site?A scraper site is a spam website that copies all of its content from other websites using web...
What is web scraping?Web scraping (web harvesting or web data extraction) is a computer software technique of...
What is phishing?An example of a phishing email, disguised as an official email from a...
What is a spoofing attack?In the context of network security, a spoofing attack is a situation in which one person or...
What is an SQL injection?An SQL injection is a code injection technique, used to attack data driven applications, in...
What is a troll?The advice to ignore rather thanengage with a troll is sometimesphrased as...
What is modSecurity?ModSecurity supplies an array of request filtering and other security features to the Apache...
What a digital footprint?A digital footprint is the data trail left by the interactions in a digital environment;...
What is 'Inline Linking' or 'Hot Linking'?Inline linking (also known as hotlinking, leeching, piggy-backing, direct linking, offsite...
What is a web crawler or web spider?A Web crawler is an Internet bot that systematically browses the World Wide Web, typically for...
What is an RSS?RSS (Rich Site Summary); originally RDF Site Summary; often dubbed Really Simple Syndication,...
What is a database?A database is an organized collection of data. The data are typically organized to model...
What is MySQL?MySQL is (as of March 2014) the world's second most widely used open-source relational database...
What is the FTP protocol?File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one...
What is the SFTP (or SSH) protocol?In computing, the SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a...
What is a startup company?A startup company or startup is a company, a partnership or temporary organization designed to...
What is 'Internet of Things'?The Internet of Things refers to uniquely identifiable objects and their virtual...
What is Photoshop and 'PSD' graphic file format?Adobe Photoshop is a graphics editing program developed and published by Adobe Systems....
What is the 'BMP' graphic file format?The BMP file format, also known as bitmap image file or device independent bitmap (DIB) file...
What is 'GIF' graphic file format?The Graphics Interchange Format (better known by its acronym GIF; /ˈdʒɪf/ or /ˈɡɪf/) is a...
What is 'JEPG' graphic file format?In computing, JPEG - named after its creator the Joint Photographic Expert Group - (/ˈdʒeɪpɛɡ/...
What is 'PNG' graphic file format?PNG transparency demonstration. 24bit PNG with 8bit alpha layer....
What is web design?Web design encompasses many different skills and disciplines in the production and maintenance...
What is Web 2.0?Web 2.0 describes web sites that use technology beyond the static pages of earlier web sites....
What is responsive web design?Responsive web design (RWD) is a web design approach aimed at crafting sites to provide an...
What is a widget?A GUI widget (or control) is an element of a graphical user interface (GUI) that displays an...
What is a pop-up ad?Pop-up ads or pop-ups are often forms of online advertising on the World Wide Web intended to...
What is a metaelement or metatag?Meta elements are the HTML or XHTML element used to provide structured metadata about a Web...
How to clear your browser's cache and cookiesMany browser related problems can be fixed by clearing your cache and/or cookies, but it's...
What is an inode?In a Unix-style file system, an index node, informally referred to as an inode, is a data...
What is a software repository?A software repository is a storage location from which software packages may be retrieved and...
What is GIT version control software?Git is a distributed revision control and source code management (SCM) system with an emphasis...
What is ZIP (file format)?.ZIP is an archive file format that supports lossless data compression. A .ZIP file may contain...
What is GZIP (file format)?gzip is a file format and a software application used for file compression and decompression....
What is TAR file format?tar (derived from tape archive) is both a file format (in the form of a type of archive...
What is tunneling and SSH tunneling?Computer networks use a tunneling protocol when one network protocol (the delivery protocol)...
What is a Packet Sniffer?A packet analyzer (also known as a network analyzer, protocol analyzer or packet sniffer—or,...
What is Spyware?Spyware is software that aims to gather information about a person or organization without...
What is Software Architecture?Software architecture refers to the high level structures of a software system, the discipline...
What is a Software Framework?A Software Framework is an abstraction in which software providing generic functionality can be...
What is the Model–View–Controller or MVC?Model–view–controller (MVC) is a software architectural pattern mostly (but not exclusively)...
What is a Integrated Development Environment or IDE?An integrated development environment (IDE) is a software application that provides...
What is an Interpreter?An interpreter is a computer program that directly executes, i.e. performs, instructions...
What is a compiler program?A diagram of the operation of a typical multi-language, multi-target...
What is the BASIC programming language?BASIC (an acronym for Beginner's All-purpose Symbolic Instruction Code) is a family of...
What is the FORTRAN programming language?Fortran (Formula Translating System) is a general-purpose, imperative programming language that...
What is the COBOL programming language?COBOL (acronym for COmmon Business-Oriented Language) is a compiled English-like computer...
What is the JAVA programming language?Java is a general-purpose computer programming language that is concurrent, class-based,...
What is the JAVASCRIPT programming language?JavaScript is a high-level, dynamic, untyped, and interpreted programming language. It has been...
What is the PYTHON programming language?Python is a widely used general-purpose, high-level programming language. Its design philosophy...
What is the PHP programming language?PHP is a server-side scripting language designed for web development but also used as a...
What is the B programming language?B is a programming language developed at Bell Labs circa 1969. It is the work of Ken Thompson...
What is the C programming language?C is a general-purpose, imperative computer programming language, supporting structured...
What is the C++ programming language?C++is a general-purpose programming language. It has imperative, object-oriented and generic...
What is the LOGO programming language?Example Logo output Logo is an educational programming language, designed in...
What is AJAX?Ajax (short for asynchronous JavaScript and XML) is a set of web development techniques...
What is a CAPTCHA?This CAPTCHA of "smwm" obscures its message from computer interpretation by...
What is the Windows Operating System?Microsoft Windows (or simply Windows) is a metafamily of graphical operating systems developed,...
What is the Android Operating System?Android is a mobile operating system (OS) currently developed by Google, based on the Linux...
Powered by WHMCompleteSolution