100 relations: Acceptable use policy, Acknowledgement (data networks), Anonymity, Anonymizer, Antivirus software, Apache HTTP Server, Apache Traffic Server, Application firewall, Application layer, Ari Luotonen, Authentication, Bandwidth (computing), Blacklist (computing), Captive portal, Client (computing), Common Gateway Interface, Comparison of web server software, Computer network, Computer security, Content-control software, Cross-site scripting, Daemon (computing), Darknet, Distributed Checksum Clearinghouse, DNSBL, Domain Name System, Dynamic Host Configuration Protocol, Eavesdropping, Encapsulation (networking), Extranet, Firewall (computing), Form (HTML), Free software, Garlic routing, Gateway (telecommunications), Geolocation, Geolocation software, Geotargeting, Gordon Lyon, HAProxy, HTTP cookie, HTTPS, Hypertext Transfer Protocol, I2P, Intermediary, Internet Content Adaptation Protocol, Internet Engineering Task Force, Internet Information Services, Internet privacy, Internet Protocol, ..., Internet Relay Chat, Internet troll, IP address, IP address blocking, JPEG, Load balancing (computing), Malware, Man-in-the-middle attack, Microsoft Forefront Threat Management Gateway, MIME, Mod proxy, Network address translation, Nginx, NT LAN Manager, Onion routing, OSI model, Performance-enhancing proxy, PHP, Polipo, Privoxy, Proxy, Proxy list, Reverse proxy, Router (computing), Secondary market, Server (computing), Server log, Slashdot effect, SMTP proxy, SOCKS, Spamming, Squid (software), SYN flood, Tinyproxy, Tor (anonymity network), Traceroute, Transmission Control Protocol, Transport Layer Security, United States Computer Emergency Readiness Team, URL, Varnish (software), Virtual private network, Web accelerator, Web Accessibility Initiative, Web cache, Web Cache Communication Protocol, WinGate, World Wide Web, X.509, Ziproxy. Expand index (50 more) » « Shrink index
An acceptable use policy (AUP), acceptable usage policy or fair use policy, is a set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used.
In data networking, telecommunications, and computer buses, an acknowledgement (ACK) is a signal passed between communicating processes, computers, or devices to signify acknowledgement, or receipt of message, as part of a communications protocol.
Anonymity, adjective "anonymous", is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness".
An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable.
Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
The Apache HTTP Server, colloquially called Apache, is a free and open-source cross-platform web server, released under the terms of Apache License 2.0.
The Apache Traffic Server (ATS) is a modular, high-performance reverse proxy and forward proxy server, generally comparable to Nginx and Squid.
An application firewall is a form of firewall that controls input, output, and/or access from, to, or by an application or service.
An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network.
Ari Luotonen is a Finnish software developer and author.
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.
In computing, bandwidth is the maximum rate of data transfer across a given path.
In computing, a blacklist or block list is a basic access control mechanism that allows through all elements (email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc.), except those explicitly mentioned.
A captive portal is a web page which is displayed to newly connected users before they are granted broader access to network resources.
A client is a piece of computer hardware or software that accesses a service made available by a server.
In computing, Common Gateway Interface (CGI) offers a standard protocol for web servers to execute programs that execute like console applications (also called command-line interface programs) running on a server that generates web pages dynamically.
This article is a comparison of web server software. The first web servers only supported static files, such as HTML (and images), but now they most commonly allow embedding of server side applications.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.
Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
Content-control software, commonly referred to as an internet filter, is software that restricts or controls the content an Internet user is capable to access, especially when utilised to restrict material delivered over the Internet via the Web, e-mail, or other means.
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications.
In multitasking computer operating systems, a daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.
A darknet (or dark net) is a portion of routed, allocated IP space not running any services.
Distributed Checksum Clearinghouse (also referred to as DCC) is a hash sharing method of spam email detection.
A Domain Name System-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an effort to stop email spamming.
The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on UDP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.
Eavesdropping is secretly or stealthily listening to the private conversation or communications of others without their consent.
In computer networking, encapsulation is a method of designing modular communication protocols in which logically separate functions in the network are abstracted from their underlying structures by inclusion or information hiding within higher level objects.
An extranet is a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
A webform, web form or HTML form on a web page allows a user to enter data that is sent to a server for processing.
Free software or libre software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions.
Garlic routing is a variant of onion routing that encrypts multiple messages together to make it more difficult for attackers to perform traffic analysis and to increase the speed of data transfer.
A gateway is the piece of networking hardware used in telecommunications via communications networks that allows data to flow from one discrete network to another.
Geolocation is the identification or estimation of the real-world geographic location of an object, such as a radar source, mobile phone, or Internet-connected computer terminal.
In computing, geolocation software is software that is capable of deducing the geolocation of a device connected to the Internet.
Geo targeting in geomarketing and internet marketing is the method of determining the geolocation of a website visitor and delivering different content to that visitor based on their location.
Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) is a network security expert, open source programmer, writer, and hacker.
HAProxy is free, open source software that provides a high availability load balancer and proxy server for TCP and HTTP-based applications that spreads requests across multiple servers.
An HTTP cookie (also called web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.
HTTP Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet.
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.
The Invisible Internet Project (I2P) is an anonymous network layer that allows for censorship-resistant, peer to peer communication.
An intermediary (or go-between) is a third party that offers intermediation services between two parties.
The Internet Content Adaptation Protocol (ICAP) is a lightweight HTTP-like protocol specified in RFC 3507 which is used to extend transparent proxy servers, thereby freeing up resources and standardizing the way in which new features are implemented.
The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).
Internet Information Services (IIS, formerly Internet Information Server) is an extensible web server created by Microsoft for use with the Windows NT family.
Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via of the Internet.
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text.
In Internet slang, a troll is a person who starts quarrels or upsets people on the Internet to distract and sow discord by posting inflammatory and digressive, extraneous, or off-topic messages in an online community (such as a newsgroup, forum, chat room, or blog) with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, whether for the troll's amusement or a specific gain.
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
IP address blocking is a configuration of a network service so that requests from hosts with certain IP addresses are rejected.
JPEG is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
In computing, load balancing improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives.
Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.
In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Microsoft Forefront Threat Management Gateway (Forefront TMG), formerly known as Microsoft Internet Security and Acceleration Server (ISA Server), is a network router, firewall, antivirus program, VPN server and web cache from Microsoft Corporation.
Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format of email to support.
mod_proxy is an optional module for the Apache HTTP Server.
Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.
Nginx (stylized as NGINX, NGiИX or nginx) is a web server which can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache.
In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.
Onion routing is a technique for anonymous communication over a computer network.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.
Performance-enhancing proxies (PEPs) are network agents designed to improve the end-to-end performance of some communication protocols.
PHP: Hypertext Preprocessor (or simply PHP) is a server-side scripting language designed for Web development, but also used as a general-purpose programming language.
Polipo is a lightweight caching and forwarding web proxy server.
Privoxy is a free non-caching web proxy with filtering capabilities for enhancing privacy, manipulating cookies and modifying web page data and HTTP headers before the page is rendered by the browser.
A proxy is an agent or substitute authorized to act for another entity or a document which authorizes the agent so to act.
A proxy list is a list of open HTTP/HTTPS/SOCKS proxy servers all on one website.
In computer networks, a reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers.
A router is a networking device that forwards data packets between computer networks.
The secondary market, also called the aftermarket and follow on public offering is the financial market in which previously issued financial instruments such as stock, bonds, options, and futures are bought and sold.
In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients".
A server log is a log file (or several files) automatically created and maintained by a server consisting of a list of activities it performed.
The Slashdot effect, also known as slashdotting, occurs when a popular website links to a smaller website, causing a massive increase in traffic.
SMTP proxies are specialized mail transfer agents (MTAs) that, similar to other types of proxy servers, pass SMTP sessions through to other MTAs without using the store-and-forward approach of a typical MTA.
SOCKS is an Internet protocol that exchanges network packets between a client and server through a proxy server.
Electronic spamming is the use of electronic messaging systems to send an unsolicited message (spam), especially advertising, as well as sending messages repeatedly on the same site.
Squid is a caching and forwarding HTTP web proxy.
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.
Tinyproxy is a HTTP proxy server daemon for POSIX operating systems.
Tor is free software for enabling anonymous communication.
In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network.
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.
Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.
The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD).
A Uniform Resource Locator (URL), colloquially termed a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.
Varnish is an HTTP accelerator designed for content-heavy dynamic web sites as well as APIs.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
A web accelerator is a proxy server that reduces web site access time.
The World Wide Web Consortium (W3C)'s Web Accessibility Initiative (WAI) is an effort to improve the accessibility of the World Wide Web (WWW or Web) for people with disabilities.
A web cache (or HTTP cache) is an information technology for the temporary storage (caching) of web documents, such as HTML pages and images, to reduce server lag.
Web Cache Communication Protocol (WCCP) is a Cisco-developed content-routing protocol that provides a mechanism to redirect traffic flows in real-time.
WinGate is an integrated multi-protocol proxy server, email server and internet gateway from Qbik New Zealand Limited in Auckland.
The World Wide Web (abbreviated WWW or the Web) is an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and accessible via the Internet.
In cryptography, X.509 is a standard that defines the format of public key certificates.
Ziproxy is a forwarding, non-caching, compressing, HTTP proxy server targeted for traffic optimization.
6a.nl, Anonymity network, Anonymous Surfing, Anonymous Web proxy, Anonymous Web surfing, Anonymous proxy server, Anonymous server, Anonymous web proxy, Application layer proxy, Application-layer proxy, Bypass (computing), CGI proxy, Caching proxy, Caching proxy server, Camolist, Circumventor, Dontcensorme.org, Forward proxy, Free proxy, HTTP proxy, HTTP proxying, HTTPS Proxy, Http proxy, Intercepting proxy server, Internet proxy, Myspace proxy, P roxy, Proxy Avoidance, Proxy Bouncing, Proxy IP, Proxy IP address, Proxy Server, Proxy Sites, Proxy Website, Proxy avoidance, Proxy bypass, Proxy chain, Proxy chaining, Proxy filter, Proxy gateway, Proxy servers, Proxyserver, SSL Proxy, Secure & Anonymous Internet Surfing, Server proxy, Split proxies, Suffix proxy, Tproxy, Translation proxy server, Transparent proxy, Web Proxy, Web proxies, Web proxy.