manage domains
Glossary of Technical Terms

Welcome to our Glossary of Technical Terms.  We know that computing and the internet are full of acronyms and technical terms that the average person may not understand, so we have put together a list of commonly used terminology and their definitions which may help you to comprehend what the techos are talking about.

A    B    C    D    E    F    G    H    I    J    K    L    M    N    O    P    Q    R    S    T   U    V    W    X    Y    Z

  • Australian Web Industry Association (AWIA) - The Australian Web Industry Association represents businesses, individuals and students involved in the web industry and aims to:
    • Further the advancement of the web industry within Australia;
    • Educate the general public about the role of professionals in the web industry;
    • Foster greater ties with like-minded organisations.
    • For more information, go to www.webindustry.asn.au
  • Blog - A blog is just another tool in your arsenal of communication with your customers.  It is an on-line form that allows you to write and upload content onto the web; and more importantly allows your readers to respond and interact with you - ask questions, leave feedback, express their point of view.  

    A blog can help your website reach more people by increasing your rating in search engines.  Search engines are constantly reviewing the world wide web for new content. 

    But just remember, a blog needs to be part of your overall marketing strategy, and must be maintained, because a blog with no new content and no comments will reflect a lack of interest back to your readers.

    If you're interested in creating a blog for your website, or a stand-alone blog, give us a call and we can talk you through the process.
  • Cloud Computing - This a common buzz word in the IT industry at the moment.  Cloud Computing basically means services that are web-based.  Any application that is accessed via the internet eg. accounting packages, management tools, etc are all part of the "cloud computing" phenomena.   SaaS (software as a service) is "cloud computing".   Output has been developing on-line applications for over 10 years, so the idea is not new, just the name!
  • CMS (Content Management System) - A Content Management System allows the end user to create content for their website using a database with a user -friendly interface.  The end-user does not need to know HTML (the language of the internet) as the CSM should have an HTML editor as the interface.  This means that creating content for your website should be as simple as using MS Word, or any other word processing application. 

    Output has its own proprietary CMS so if you'd like to learn more about how easy it is to use, give us a call today.
  • DNS or Domain Name Server - The Domain Name Server is simply a machine(s) which hosts domain names.  Anyone attempting to load a domain/website will be directed to that server upon which the corresponding website files are hosted.
  • FTP or File Transfer Protocol - File Transfer Protocol is a typical way to upload your website files to the server.
  • Greylisting - Greylisting is a way of minimising SPAM email reaching the end users' email box.  It does this by checking that an incoming email has come  from a genuine email server.  The incoming mail server temporarily rejects an email to force the originating email server to resend the email.  A spammer server will not typically resend an email, while a properly configured email server will resend the email, generally within a short time frame.
  • ISP or Internet Service Provider -The organisation that supplies you with access to the internet. 
    Don't confuse this with your website hosting company, as they are only responsible for providing the world with access to your website.  Each individual or organisation still needs to access the internet to get to your website.
  • SEO or Search Engine Optimisation - Search Engine Optimisation is how we improve the ranking of a website in the Search Engine (eg. Google, Yahoo, Bing, etc).   It can be a complicated process to optimise a website as each of the search engines have their own rules on what is important.  These rules also change regularly.  This is why SEO is now a business in its own right - because keeping up to date with the latest changes is time consuming, but a higher ranking on a search engine will generally drive more business to a site.  Output is always updating our SEO knowledge and we incorporate SEO into all our website development
  • Sitemaker - Sitemaker is Output's proprietary application development framework for building on-line applications quickly and cost efficiently.  We use this framework to develop custom content management systems, intranets and on-line applications.  Sitemaker is currently used by more than 10,000 active users. 
  • Spoofing - "E-mail spoofing is a term used to describe (usually fraudulent but can sometimes be legitimate) e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. E-mail spoofing is a technique commonly used for spam e-mail and phishing to hide the origin of an e-mail message. By changing certain properties of the e-mail, such as the From, Return-Path and Reply-To fields (which can be found in the message header), ill-intentioned users can make the e-mail appear to be from someone other than the actual sender. The result is that, although the e-mail appears to come from the address indicated in the From field (found in the e-mail headers), it actually comes from another source. 

    Occasionally (especially if the spam requires a reply from the recipient, such as the '419' scams), the source of the spam e-mail is indicated in the Reply-To field (or at least a way of identifying the spammer); if this is the case and the initial e-mail is replied to, the delivery will be sent to the address specified in the Reply-To field, which could be the spammer's address. However, most spam emails (especially malicious ones with a trojan/virus payload, or those advertising a web site) forge this address too, and replying to it will annoy an innocent third party. 

    Prior to the advent of unsolicited commercial email as a viable business model, "legitimately spoofed" email was common. For example, a visiting user might use the local organization's smtp server to send email from the user's foreign address. Since most servers were configured as open relays, this was a common practice. As spam email became an annoying problem, most of these "legitimate" uses fell victim to antispam techniques.

Source:  http://en.wikipedia.org/wiki/Email_spoofing


  © Output DSJ Pty Ltd  I  Administration  I  Powered by Sitemaker  I  Design by beej.me