Browse Definitions :
Definition

virtual hosting

On the Internet, virtual hosting is the provision of Web server hosting services so that a company (or individual) doesn't have to purchase and maintain its own Web server and connections to the Internet. A virtual hosting provider is sometimes called a Web or Internet "space provider." Some companies providing this service simply call it "hosting." Typically, virtual hosting provides a customer who wants a Web site with: domain name registration assistance, multiple domain names that map to the registered domain name, an allocation of file storage and directory setup for the Web site files (HTML and graphic image files), e-mail addresses, and, optionally, Web site creation services. The virtual hosting user (the Web site owner) needs only to have a File Transfer Protocol (FTP) program for exchanging files with the virtual host.

Some virtual hosting providers make it possible for customers to have more control of their Web site file system, e-mail names, passwords, and other resources and say that they are providing each customer a virtual server - that is, a server that appears to be entirely their own server. When a customer does indeed want to have its very own server, some hosting providers allow the customer to rent a dedicated server at the hosting provider's location. If a customer is allowed to place their own purchased equipment at the provider's location, this is known as colocation.

This was last updated in September 2006

Continue Reading About virtual hosting

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

  • hardware security module (HSM)

    A hardware security module (HSM) is a physical device that provides extra security for sensitive data.

  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close