Browse Definitions :

Internet acronyms and lingo

Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.

OVE - U

  • oversharing - Oversharing is the disclosure of an inappropriate amount of detail.
  • P3P (Platform for Privacy Preferences) - P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements.
  • packet monkey - On the Internet, a packet monkey is someone (see cracker, hacker, and script kiddy) who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.
  • pagejacking - Pagejacking is stealing the contents of a Web site by copying some of its pages, putting them on a site that appears to be the legitimate site, and then inviting people to the illegal site by deceptive means - for example, by having the contents indexed by major search engines whose results in turn link users to the illegal site.
  • PageRank - PageRank (PR) is Google’s main method of ranking web pages for placement on a search engine results page (SERP).
  • passive FTP - Passive FTP (sometimes referred to as PASV FTP because it involves the FTP PASV command) is a more secure form of data transfer in which the flow of data is set up and initiated by the File Transfer Program (FTP) client rather than by the FTP server program.
  • path to profitability (P2P) - Path to profitability (sometimes abbreviated as P2P, which also stands for peer-to-peer) is a term that refers to a business plan that is designed to take an enterprise from startup to turning a profit.
  • PEBCAK (problem exists between chair and keyboard) - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.
  • phantom page - A phantom page is a Web page that is optimized for search engines rather than for humans.
  • pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent.
  • phishing kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
  • phubbing - Phubbing, a contraction of the words “phone snubbing,” is the act of ignoring a companion in favor of using a smartphone.
  • ping - Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests.
  • ping of death - On the Internet, ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol.
  • pixie dust or antiferromagnetically-coupled (AFC) media - Pixie dust is the informal name that IBM is using for its antiferromagnetically-coupled (AFC) media technology, which can increase the data capacity of hard drives to up to four times the density possible with current drives.
  • pluton - A pluton is an orbital body that is distinguished from a traditional planet by the length of its orbit, the aspect of that orbit and the shape of the orbit, which is far from circular.
  • pop-under - On the Web, a pop-under is a window that is created but temporarily "hidden" behind the window of a Web site that the user has chosen to visit.
  • pop-up ad - A pop-up ad is a pop-up window used for advertising.
  • pop-up download (or download pop-up) - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • POP3 (Post Office Protocol 3) - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • power-up (or power-on) - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.
  • product positioning - Product positioning is the tailored presentation of a product or brand for a specific targeted demographic.
  • Programmer's Day - Programmer's Day celebrates the contributions of programmers to humanity.
  • pundit - A pundit is a Brahman scholar.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • Qik - Qik is an online video streaming service that allows anyone with a strong wireless Internet connection and a video camera-equipped smartphone to broadcast live events.
  • reach - In Internet marketing, reach is how many different people visit a Web site to see an ad and also what percentage of these people fall into the audience to which an ad is targeted.
  • real life - Real life is a term used to describe what happens outside the Internet and implies that somehow the Internet furnishes us with a virtual life.
  • reciprocity - In negotiation, reciprocity is a mutual or cooperative exchange of favors or privileges.
  • red screen of death - The red screen of death is a term coined by some early testers of Longhorn (the code name for Microsoft's latest Windows operating system) who, in May 2005, came across an error message appearing against an all-red display screen.
  • return on marketing investment (ROMI) - Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.
  • reverse DNS (rDNS) - Reverse DNS (rDNS) is a method of resolving an IP address into a domain name, just as the domain name system (DNS) resolves domain names into associated IP addresses.
  • RickRoll - On the Internet, a RickRoll is a prank where a visitor who clicks on a specific link is intentionally misdirected to a video of pop star Rick Astley's hit "Never Gonna Give You Up.
  • Robert Metcalfe - Robert Melancton Metcalfe is a United States engineer and inventor born April 7, 1946 who has credits in co-creating the internet, Ethernet, 3Com, and the self-named Metcalfe’s law.
  • rogue - In general, a rogue is someone who strays from the accepted path, is mischievous, or is a cheat.
  • roundtripping - In information processing, roundtripping is the conversion (or, in some usages, the repeated conversion back and forth) of a document in one format such as Microsoft Word to a document in another format such as WordPerfect or HTML and then back again.
  • Safe Harbor - Safe Harbor is the name of a policy agreement established between the United States Department of Commerce and the European Union in November 2000.
  • Scooter - Scooter is the Web "crawler" for the AltaVista public search engine.
  • screen name - In a computer network, a screen name is the name a user chooses to use when communicating with others online.
  • script kiddy (or script kiddie) - Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.
  • scumware - Scumware is any programming that gets on your computer from Internet sites without your consent and often without your knowledge.
  • second-level domain (SLD) - A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address).
  • self-sending spam - Self-sending spam is unsolicited e-mail that looks like you sent it to yourself: your name appears on the "from" line as well as the "to" line.
  • Semantic Web - The Semantic Web is an idea of World Wide Web inventor Tim Berners-Lee that the Web as a whole can be made more intelligent and perhaps even intuitive about how to serve a user's needs.
  • server farm (Web farm, Web server farm) - A server farm is a group of computers acting as servers and housed together in a single location.
  • sexting - Sexting is the act of sending or receiving sexually-explicit images and messages, typically between cell phones.
  • shadow banning (shadowban) - Shadow banning, in discussion forums and social media, is the practice of making a particular user's posts visible only to that user.
  • sheepdip (sheep dipping or a footbath) - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • shopping cart - On a Web site that sells products or services online, the shopping cart is a common metaphor (from the original grocery store shopping cart) for the catalog or other pages where a user reads and makes selections.
  • shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.
  • showrooming - Showrooming is the act of visiting a physical retail store to examine a product in person and then shopping online to purchase the item at a find lower price.
  • silicon cockroach - Silicon cockroach is a term invented by networking expert John Sidgmore to describe the tiny portable electronic devices that are expected to become popular in the next few years, creating new behavior patterns while putting new demands on network bandwidth capacity.
  • simultaneous localization and mapping - Simultaneous localization and mapping (SLAM) is the synchronous location awareness and recording of the environment in a map of a computer, device, robot, drone or other autonomous vehicle.
  • site map - A site map is a visual or textually organized model of a Web site's content that allows the users to navigate through the site to find the information they are looking for, just as a traditional geographical map helps people find places they are looking for in the real world.
  • skyscraper - A skyscraper ad is a tall and narrow banner advertisement usually placed to the right of content on a Web page.
  • slacktivism - Slacktivism is taking action online in ways that involve little personal effort and have little immediate effect; the word is a portmanteau of slacker and activism.
  • smiley - In Internet e-mail messages and Web discussions, a smiley is a sequence of typed characters that graphically produces the sideways image of someone smiling, like this::-)The first use of a smiley is currently attributed to Scott E.
  • SNAFU (situation normal, all f***ed up) - SNAFU is an acronym for "situation normal, all f***ed up.
  • snake oil - In cryptographic and other computer products, snake oil is a negative term used to describe exaggerated claims made by vendors who are overly optimistic or purposely seeking to take advantage of consumers who do not have the expertise to judge a product.
  • Snapchat dysmorphia - Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image.
  • snoop server - A snoop server is a server that uses a packet sniffer program to capture network traffic for analysis.
  • social curation - Social curation is collaborative sharing of Web content organized around one or more particular themes or topics.
  • social media - Social media is the collective of online communications channels dedicated to community-based input, interaction and collaboration.
  • sock puppet - A sock puppet, in the context of online communications, is a fake identity created to promote someone or something through blogs, wikis, forums or social networking sites such as Facebook or Twitter.
  • sock puppet marketing - Sock puppet marketing is the use of a false identity to artificially stimulate demand for a product, brand or service.
  • SODOTO (See One, Do One, Teach One) - SODOTO (See One, Do One, Teach One) is a methodology of teaching and learning skills and best practices through direct observation of a task, hands-on practical experience performing the task and teaching the task to another person.
  • source quench - Using the Internet Control Message Protocol (ICMP), a source quench is a message from one host computer to another telling it to reduce the pace at which it is sending packet to that host.
  • spam trap - A spam trap is the inclusion of an option in an online form that is preselected by default with the expectation that the user will fail to notice the option.
  • spambot - A spambot is a program designed to collect, or harvest, e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail, also known as spam.
  • spamhaus - A spamhaus (haus is the German word for house) is an Internet service provider (ISP) or other business that allows the distribution of unsolicited commercial e-mail (UCE).
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • Stop Online Piracy Act (SOPA) and PIPA - The Stop Online Piracy Act (SOPA), also known as House Bill 3261, is legislation introduced in the United States House of Representatives to enforce current laws that make stealing intellectual property and trafficking in counterfeit goods illegal.
  • Stuff I've Seen - Stuff I've Seen is the name of a capability under study by Microsoft that allows a Windows user to quickly locate all occurrences of any item of information the user has previously created or read, whether in e-mail, address books, Web pages, or office documents, all from a single search box built into the task bar.
  • subscription economy - A subscription economy is a model for trade of desired content, products and services in exchange for recurring, scheduled payments.
  • superstitial - A superstitial is a Web ad format developed by Unicast, which calls itself a rich media company.
  • SYN flood (half open attack) - SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.
  • synergy - In general, synergy (pronounced SIN-ur-jee, from Greek sunergia, meaning "cooperation," and also sunergos, meaning "working together") is the combined working together of two or more parts of a system so that the combined effect is greater than the sum of the efforts of the parts.
  • talker - On the Internet, especially in the United Kingdom, a talker is a Web site that hosts online chatting or conversations entered at the keyboard.
  • talking Trojan - A talking Trojan is a Trojan horse program that mocks the user of an infected PC with a repeating audio message while it deletes the entire contents of a hard drive.
  • TCPMAN - TCPMAN is a utility for manual or script modem dialing that is used when accessing the Internet.
  • technology addiction (internet addiction) - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.
  • teergrube - A teergrube (German for tar pit) is a computer server set up to be intentionally slow, as a trap for spammers using address harvesting programs.
  • thumbing - Thumbing is a method of typing on a small keyboard using the thumbs.
  • tl;dr (TL;DR) - TL;DR is an abbreviation for "too long; didn't read" that is used to indicate that the person posting about an article either didn't read it in its entirety or didn't read it at all.
  • ToFu, MoFu and BoFu - ToFu, MoFu and BoFu is a method used by sales and marketing professionals to pace and cater their approach to sales leads within a sales funnel, depending on the customer’s current phase of the purchase decision.
  • top-level domain (TLD) - A top-level domain (TLD) identifies the most general part of the domain name in an Internet address.
  • transition ad - A transition ad is a Web page containing a commercial message that appears temporarily between two other Web pages.
  • trap - In a Web site, a trap is a page that does not allow the reader to back up a previous page (the Back button on the toolbar is inoperable).
  • troll - As used on the Internet: As a verb, the practice of trying to lure other Internet users into sending responses to carefully-designed incorrect statements or similar "bait.
  • Tumblr - Tumblr is a free microblogging site.
  • Tux - Tux, the penguin, is the generally accepted official logo for the Linux operating system.
  • tweak freak (tweaker) - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • Twitter - Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets.
  • typosquatting - Typosquatting is a form of Internet cybersquatting, based on the probability that a certain number of Internet users will mistype the name of a Web site (or actually its URL) when surfing the Web.
  • U (measurement) - A U is a standard unit of measure for designating the height in computer enclosures and rack cabinets.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close