Are you looking for a list of internet terms? Well I have a list of 20 popular terms that are used often. But before we get to the list, how many of you know the difference between the Internet versus the Web (WWW)? Most people think that they mean the same, but, that’s not entirely right.
Well then, what is the difference?
Tthe internet is a vast connection of computer networks that are linked together; it’s comprised of millions of private, public, and government networks exchanging large amounts of information. Connected to these networks you will find desktop computers, tablets, cell phones, video consoles, and the like.
The internet was started as an American military project in the late 1960’s, the purpose was to build a communication service via computers networked together; it has since become a public spider web of connected network devices that we now have today. You will find that no one single person or origination controls or owns the net.
The internet carries a large range of information resources, and services, such as the email, telephony, and the peer-to-peer file sharing networks, known as the WEB.
Now for the Web (World Wide Web, WWW), this is the information space on the internet where documents and other resource of information are identified by their URLs (Websites) which are accessed by using a web browser (Internet Explorer, Google Chrome, Firefox). It was developed in 1989 by an English scientist Tim Berners-Lee, he then wrote the first web browser in 1990.
So with all of that being said the Web resides on the Internet. Now that we got that out of the way, let’s take a look at 20 of the top common Internet Terms in use today, starting with.
We all know this one right? This is the software package that enables one to be able to view web pages that consist of content and graphics. The web browsers convert HTML and XML code into readable documents and images. Did you know that there are over fifty different Web Browsers available for use, well there are, and a lot of them are tailored to specific purposes like gaming, ebay, reading, and so on. If you would like to check out a full list of browsers, I came across this website (http://www.webdevelopersnotes.com/browsers-list) where they keep an updated list of all the avalible browsers to date. The only thing is that they don’t list what each one is tailored for. But if you like to try different things, it’s worth the look.
Add-ons and Plug-ins for the Browser:
Add-ons and plug-ins are small software program that you add to your browser to enhance your browsing experience. Examples would be like adding the Adobe document reader so you can view documents right from your browser or a plug-in so you can view a video or listen to music. Each browser supports different add-ons and plug-ins which you can access by going to the settings menu and finding extensions.
http and https:
This is the language that the Web uses to display pages of information, http refers to Hypertext Transfer Protocol and https is Hypertext Transfer Protocol SECURE. The difference between the two is the https has an added layer of encryption to hide your personal data and passwords, like when you log into your online bank account it will be using https.
Encryption is the process of taking information in any form and encoding it so only the people you wish to view the information can with an encryption key. When using an algorithm to encrypt information there will be a key (like a password) produced so the information can be decrypted by the party that is entrusted to do so.
Having your information encrypted is what allows you to view and change your data to institutes like your online banking, anything related to the government, or anywhere else that you do not wish anyone else to see this information. This is what is used to keep hackers busy and frustrated while they try to hack your information. 🙂
Hypertext Markup Language (HTML), this is the language used to create the web pages you visit, so that the browser you are using can read the HTLM language and present a page in a viewable or audible format.
Extensible Markup Language. This is a markup language used to define a set of rules for encoding documents in a form that is readable to humans and machines.
URL-(uniform resource locators) this represents the address of Web pages; it specifies the location of said web page where it is located on a computer network. You will find these addresses located in the address bar of your browsers. They will look something like this (https://en.wikipedia.org/wiki/Uniform_Resource_Locator)
We have all heard of this right, like when someone is asking you, what is your IP address? No, well it is the numerical number assigned to your devices (like your computer, printer, laptop, etc) that are part of a computer network. The IP address uses an internet protocol to communicate with your devices, thus you have the Internet Protocol Address (IP Address), which is defined in a 32-bit number such as (126.96.36.199.1).
ISP stands for Internet Service Providers; OK we know who they are right? These are the companies that we pay a monthly fee to, just so we can access the internet via a DSL or Cable modem, and catch up our social media sites. 🙂 The modems are using a point-to-point protocol to connect to one of their many routers, which then will route you to the internet anywhere in the world.
This stands for peer-to-peer, as in a P2P network, the peer’s are computer systems that are connected together by the internet. Here you can share files (music, videos and so forth) between other computers on the network without having to use a central server. Now to do this you need P2P software like Limewire, Kazaa, BearShare, and a few others.
When using any of these you will be connected to anyone other person that is using that software and are sharing their files. Now they will also have access to your files (but only the ones that you wish to share).
This refers to those individuals that use psychological manipulations to get you to perform actions like clicking on a button to download something (where they imbed malicious software), or in divulging confidential information to update an account or something similar that makes them look legit.
While the term may seem similar to social networking, it refers to malicious actions taken through Social Medias, Emails, and Webpage’s; this is something that we all should be aware of when using the internet. You will find that a great deal of people that have been hacked in one way or another was through social engineering.
For an example, let’s say that you just opened up a webpage and up pops a message saying that your computer has just received a virus and you should download this specific program, or maybe they will give you a phone number to call so you can get it off your computer. Now if you should click to download the program, you will most likely be downloading spyware that will search your data files for important information. Or should you make that phone call, they will be asking you to give up your personal information by leading you to believe they are legit in what they are doing to help you out.
Another example is on social media sites like Facebook and Twitter where they will post public messages stating that they are giving away prizes and whatever and all you have to do is enter your personal information to receive it.
So unless you know the source to be legit, don’t fall for these attacks. If you’re unsure about something you can Google it, or ask Cortana if using Edge, and find out about it before giving any Personal Data out. You can check out my post on Ways to protect your privacy, to learn more about staying safe on the internet.
Known as spam which usually comes in the form of emails where people are trying to sell you something too good to be true, like How to make $10,000.00 dollars a month with these 10 easy steps. (Yea right) And some of them will try to lure you into divulging your personal information like passwords, social security numbers and so on. All because they’re too lazy to get a real job, and they find it easier to steal from us.
This is where email filtering comes into play, it will sort through your emails and store the ones it finds suspicious in a junk or spam folder. But the people that are sending these out are getting more creative with their delivery system and getting past your filtering system. Never open up an attachment or click on a link inside one of these emails that you are not one hundred percent sure you know the person that sent it.
Yes it sounds like fishing, and it is similar to that except that a phisher is someone that is Phishing for your personal information instead of fish. These people like to send emails out that look like they are from a legitimate website like PayPal, eBay, and even banking institutes.
This is where they dangle some bait in front of you in the form or saying something like your account needs to be updated, please click here to update your information, and from there they will be asking you for your password and username, some will even ask you for your full name and address along with social security number and even a credit card number.
The URL (web address) of the site in which they want you to visit will be where you can tell if it is legit or not by looking at the last part of the address. If it is a phony it will look something like (http://www.PayPal.update123.com), notice the last part .update123.com, this is a bogus URL, and if it were legit it would be something like PayPal/update/.com. Just keep in mind if you have any doubt, don’t click on any links.
This is yet another way hackers will use to get you to their fake websites; now unlike phishing where they entice you with an email to their site, pharmers will redirect you to their fake website. They will do this by adding attachments full of malicious software to the emails, which will poison a user’s local DNS cache, causing your browser to redirect to their fake website instead of the intended site.
This will be done without you having any knowledge at the time of what is taking place. For example, let’s say that you intend to go to Amazon’s site to do some shopping, so you enter Amazon into your browser’s address bar, hit return, and low and behold you end up at a unfamiliar Amazon site that does not look like the one you visited last time. This is the hacker’s website where they will be asking you to enter your personal information to fix the problem; and that’s when they steal your data. If you find yourself at a Website that does not seem to be the one you were after, shutdown your computer and restart, this will reset your DNS entries where the hacker has stored the IP address to their phony site.
We have all heard the story of the Trojan horse, where the Greeks gave the people of Troy a large horse as a peace offering, and once it was inside the city walls and the people of the city had fallen asleep for the night the Greeks soldiers snuck out of the horse opened the gates and let the rest of their army in and took over the city.
Well that is what Trojan software will do to your computer when it is downloaded to your computer in the form of something like a game, or some utility program or any other form of software that you could think of. Once you run this program it will do malicious things to your system. Any good antivirus program that is up to date will catch the Trojan software before it has a chance of infecting your hard drive. One good thing is that the Trojan software cannot infect your computer until you double-click on the program, giving your antivirus program a chance to catch it before it does.
The firewall for a computer comes in the form of either software or hardware, and is used to block unwanted traffic to your computer over the internet. Large companies will usually use a hardware configuration to block unwanted traffic, as where for the individual users your operating system like Windows will come with a firewall program installed. You can purchase firewall utilities on your own to better protect your system, there are many available and some antivirus software will also have them in their packages. If you are looking for a good antivirus program with firewalls, check out my post on The best security software.
Well we know what computing is, so how does the cloud come into play? Well the cloud represents the applications and other services offered over the internet. These services are in the form of large Data Centers located all over the world. With these data centers you can share information and use applications with other users and devices that are attached to the internet.
So with adding the Cloud with your computing you come up with Cloud Computing. Examples of cloud services will consist of social media, online backup services like Google Drive, OneDrive, and so forth. Other forms of cloud computing are services like Microsoft office, Google Docs, Apple’s iCloud, and of course several others.
SaaS is software that is located on the internet and is accessed through your browser instead of your computer. It is considered to be part of Cloud Computing because the software is located on remote servers instead of individual computers. Here the users can store data in a central location, making it easier to share and collaborate with other users.
Examples of SaaS would be something like Google Docs, Sheets, and Photos, Microsoft office, Word, Excel, and PowerPoint. An individual can use any of these and others to work on a document or whatever else and be able to collaborate with other users or share them.
The internet Port is a number that refers to a kind of protocol a server is using on the internet. A typical Web server will be listed on port 80; FTP uses port 21, while e-mails will use port 25. And then there are game servers that will be using a different port all together.
Known as electronic-commerce is in relations to business that resides on the Web, such as the best known online business of today, yes your right, Amazon.com, and of course there a lot more out there that are available to the consumer.
There are two forms of e-commerce that are used on the internet, the first and most popular for the individual user is the B2C (Business-to-Consumer) and the other would be the B2B (Business-to-Business) for businesses that cater to other businesses.
Wrapping up a List of Internet Terms:
I know there are even more terms out there that relate to the Internet and Web, but I thought I would share the most used ones by individual like us.
So how many did you know, did you know all of them, or maybe most of them? Is there other ones that you know of that are used a lot? If so why not share them with the rest of us. You can do so in the comment section below, I look forward to hearing from you.