Glossary of Web Design Related Terms

a

Account Manager
Account Manager is a tool that gives you an organized overview of your account and the products and services in it. You may use Account Manager to update your personal and account information or make other changes to your account settings.
Address Book
With your E-mail Address Book you can create and maintain a customized database of information about your contacts, including each person's phone number, fax number, wireless number and e-mail address. Each e-mailbox comes with a full-featured, Web-based address book that lets you remotely access your contacts from anywhere in the world.
Advanced Web Mail
Web Mail allows you to access your e-mail account from anywhere using a Web browser. Advanced Web Mail includes features such as multi user calendar, task manager, photo albums, journal manager, file storage, instant messenger and more.
Adware
Adware is hidden software, often included with a useful software program, that automatically presents pop-up advertisements.
Alias(es)
An alias gives you the ability to create multiple disposable e-mail addresses for each e-mailbox, so that you don't have to share your primary e-mail address. All e-mails sent to an alias go to the primary e-mail address.
Anti-Phishing (pronounced "fishing")
Protection against a specific type of spam e-mail which is called 'phishing'. Phishing refers to fraudulent communications designed to deceive consumers into providing personal, financial, or account information, including account user name and password, credit card information, and social security number. These spam e-mails often create a false sense of urgency intended to provoke the recipient to take immediate action; for example, phishing e-mails frequently instruct recipients to "validate" or "update" account information or face cancellation.
ASP-Windows
Active Server Page is a server-side scripting technology that can be used to create dynamic and interactive Web applications. An ASP page is an HTML page that contains server-side scripts that are processed by a Web server before being sent to the user's browser.
Attachments
Attachments are separate files that are sent or received along with your e-mail messages. It can be anything from word processing documents to digital photos, from spreadsheets to Web pages. You can save an attachment on your hard disk to work with it as a separate file or view it later using another application.
Authorization Code
Also known as "auth code", "passcode", or "key", the authorization code provides an extra level of security for domain name transfers. The authorization code is unique for each domain name and is assigned by the registrar at the time the domain name is registered. Anyone transferring domain names from one registrar to another is required to provide the authorization code to finalize the transfer. Authorization codes can only be obtained from the current registrar. Registrars are contractually obligated to provide the authorization code upon request by the registrant.
Autoresponders
When a message is sent to the e-mail address with an active autoresponder, the message is automatically replied to with a pre-written message. Such messages are typically used for an Out of Office message.

b

Backorder
Thousands of domain names expire every day. If there is a .com, .net, or .org domain name you want, but it's currently registered with someone else, you can place a backorder through SnapNames, a partner of Network Solutions. They will continually monitor the domain name and attempt to register it on your behalf if it becomes available.
Backups and Restore
WGC will create a regular backup of your Web site to restore for later if necessary.
Bandwidth
Bandwidth is the maximum amount of data that can be transferred in a given time, usually measured in seconds. It determines how much data can flow through your site.
Bit
Bit is short for binary digit. A bit is the smallest unit of data a computer can handle. Bits are used in various combinations to represent different kinds of data. Each bit has a value of 0 or 1. See 'byte' for more information.
Bookmark (Bookmark Manager)
To mark a document or a specific place in a document for later retrieval. Nearly all Web browsers support a bookmarking feature that lets you save the address (URL) of a Web page so that you can easily re-visit the page at a later time.
Byte
A byte is a series of bits of a particular length, usually 8. Computer storage space is measured in bytes. 1024 bytes = 1 Kilobyte (KB). 1,000 KB = 1 Megabyte (MB).

c

Catch All E-mail Addresses
A Catch-All E-mail address accepts and delivers any message not addressed to a specific e-mailbox at your domain name to the e-mailbox you specify as Catch-All. This way, no e-mail sent to your domain will be lost.
Certified Offer Service (COS)
Certified Offer Service from Network Solutions lets you make an anonymous offer to buy already registered domain names ending with .com, .net, .org, .biz, .info, and .us extensions.
The first step in the Certified Offer Service process is to make an offer to the current Primary Contact (Seller) as listed in WHOIS. A free value assessment tool is provided to assist you (the Buyer) in determining the correct offer price. Once you initiate the process, Network Solutions will immediately send your Certified Offer to the Seller via e-mail.
The Seller has 10 days to respond to the offer with an acceptance, rejection or a minimum acceptable price. If the Seller counters with a minimum price, the Buyer has 10 days to respond. Once a price is agreed to between the Buyer and Seller, the Buyer's credit card is charged for the accepted offer amount - plus a 5% transaction fee - and the transfer process is initiated.
CGI-Bin Directory
A directory on the server where the executable CGI (Common Gateway Interface) scripts reside.
Cold Fusion MX
A Web application server that integrates Web pages and databases. When you enter a request Cold Fusion queries a database and returns the results in HTML form.
Computer Virus
Viruses are small files that attach to e-mails or downloaded files and infect your computer. They can be harmless (they can place a funny picture on your monitor) or dangerous (they can go through your address book and send everyone within your address book the same virus). More dangerous viruses can wipe out your computer and all your information. Some viruses can take over your machine and send spam from your computer. Without your knowledge, you can become a spammer.
Cookie
Cookies are tracking software, placed in a file on your computer's hard disk, that identifies a return visitor to a Web site. They can also be used to "remember" user-selected preferences, such as a login, for a particular Web site. Cookies are generally harmless, and many popular e-commerce sites require your Internet browser to allow them to set cookies in order to make a purchase.
Copy
Copy is the written, typed or printed words that make up the content of your Web site, newspaper, magazine, etc.
Counter
A Counter shows you how many page views or hits occurred on a certain Web page on your Web site.
Country-Specific Domain Names (ccTLDs)
Country code domain extensions represent a specific country. ccTLDs allow you to create an in-language Web site and display different site content to visitors from various cultures around the world. You can also register ccTLDs to prevent unauthorized use of trademarks, brands and licensed names around the world.

d

Disk Storage
Your Web disk Storage (or data storage) consists of HTML files, graphics, audio clips, e-mail, and all other files that make up your Web site. The amount of disk Storage you need depends on what your Web site will be used for. If you will only be publishing text, 1MB of Storage is equal to approximately 100 pages of text. However, most Web sites include graphics and as your online business grows, you may also include interactive customer features such as forums which use significantly more Storage.
Another reason you may need more disk Storage is if you are offering software or audio/video files for your visitors to download. You would then need to store these products within your allotted disk storage and again, all these items will take more Storage.
Data Transfer
Data Transfer is the amount of data transmitted over an Internet connection in a given time. It is used up by traffic to your Web site and also sending and receiving e-mail. For example if someone views a 1MB Web page on your site 1MB of data transfer is used. If 10 people view it then 10MB of transfer will be consumed. If you send an e-mail with a 2MB attachment it will use 2MB of data transfer. The amount of transfer that you require while choosing a host depends on two factors:
  1. The size of your site and
  2. The popularity of your site.
If your Web site provides large audio/video files, computer programs, and audio / video downloads then you should consider a package with a large amount of data transfer. For example, if you have a video file that is 1.5 MB in size and 100 visitors download the file during one day. This means that 1.5 GB (1.5MB * 100 visitors) of transfer will have been used. If you multiply that by 30 days for the month it comes to 45 GB.
Flash Web sites and Virtual Reality (VR) sites require the most transfer of all.
Design
The aesthetic and navigational architecture of a Web site.
Directory Pointers
A directory pointer (or subdomain) allows you to point that subdomain to a particular page (or directory) of a Web site. For example, if you registered the domain name janesbagels.com, an example of a subdomain would be specialpromotions.janesbagels.com. In this case the customer will go straight to the special promotions page instead of going to the main page of janesbagels.com.
Disk Space
Your Web disk Storage (or data storage) consists of HTML files, graphics, audio clips, e-mail, and all other files that make up your Web site. The amount of disk Storage you need depends on what your Web site will be used for. If you will only be publishing text, 1MB of Storage is equal to approximately 100 pages of text. However most Web sites include graphics and as your online business grows, you may also include interactive customer features such as forums which use significantly more Storage.
Another reason you may need more disk Storage is if you are offering software or audio/video files for your visitors to download. You would then need to store these products within your allotted disk storage and again, all these items will take more Storage.
Domain Name Extensions
Network Solutions offers a variety of domain name extensions. Protecting brand identity has become very important, so often customers will register multiple extensions and variations of their domain names. Here are the most frequently registered extensions and their common usage, although it must be noted that any extension can be used for any purpose:
Extension Common Usage
.com Commercial, but is commonly used for everything
.net Internet administrative site, but is commonly used
.org Organization
.info Information
.biz Business
.us United States
.name Personal Web sites
.ws Western Samoa, but is often used for Web Sites
.bz Belize
.vg British Virgin Islands
.cc Cocos (Keeling) Islands
.ms Montserrat
.gs South Georgia & the South Sandwich Islands
.tc Turks and Caicos Islands
.tv Tuvalu, but often used for television
.uk United Kingdom
.de Germany
.eu European Union
.be Belgium
.cn China
.tw Taiwan
.at Austria
.nz New Zealand
.mx Mexico
Domain Names
A domain name is also called a Web address. A domain name is used as an address for your Web site and e-mail, just like www.janesbagels.com and orders@janesbagels.com. At Network Solutions you can register any domain name not already taken, or you can transfer to Network Solutions a domain name you may have already registered elsewhere. Once you register your domain name, you can point that domain name to your Hosting account.
Domain Pointer/Subdomains
Your hosting account will allow you to point or assign several domains (e.g. janesbagels.com) to your hosting package, including domains that you have registered with Network Solutions and domains that you have registered with other providers. You can also create subdomains for these registered domains.
Domain Protect
Domain Protect adds an extra layer of protection to your domain name registration, guarding it against unauthorized domain name transfers.
When turned on, Domain Protect helps to block the transfer of your domain name to another Registrar. It provides protection from "domain hijackers," or others who may attempt to authorize a transfer of your domain name registration. With Domain Protect turned on you can still perform legal name changes, account consolidation or transfers between Network Solutions accounts. To transfer a domain name to another Registrar, you must first turn off Domain Protect.

e

Electronic Commerce/E-Commerce
Refers to the ability to sell products through your Web site
E-mail Address
This refers to an electronic mailing address to which e-mail may be sent and received.
E-mail Aliases
Aliases are additional, disposable incoming e-mailbox addresses that you can create for special or short-term uses, such as info@janesbagels.com, or sales@janesbagels.com. You may want to use an alias when you don't wish to share your primary e-mail address. All messages sent to an alias will be delivered to your primary e-mailbox. All messages sent from an alias will use the primary e-mailbox address in the 'From' address of your message.
E-mail Attachments
Attachments are separate files that are sent or received along with your email messages. An attachment can be anything from word processing documents to digital photos, from spreadsheets to Web pages. You can save an attachment on your hard disk to work with it as a separate file or view it later using another application.
E-mailbox Storage
Each e-mailbox comes with 500MB of storage. If you would like more storage, we suggest that you POP your e-mail to your favorite Mail software like Microsoft® Outlook. This way you don't have to closely monitor your e-mailbox storage.
E-mailboxes
E-mailboxes are essentially e-mail addresses that you can use to communicate with your customers and promote yourself with a personalized e-mail address like orders@janesbagels.com. Each e-mailbox from Network Solutions comes with an address book, virus and spam protection, Web Mail, POP and SMTP access, e-mail aliases, e-mail forwarding, calendar and much more.
Encryption
The process of encoding data to prevent unauthorized access, especially during transmission. Encryption is usually based on one or more keys, or codes, that are essential for decoding, or returning the data to readable form.* Encryption is used to maintain information privacy.
*definition © Microsoft Computer Dictionary Fifth Edition 2002
EU Registration Service
The Network Solutions .EU Registration Service is a license agreement that allows you to receive all of the benefits of a .eu domain name extension, regardless of your physical address. Our European partner, SNNS Ltd., will be the registrant of record for the .eu domain name you license.

f

FAQ
An acronym for Frequently Asked Questions. FAQs are online documents that list and answer the most common questions on a particular subject. There are hundreds of FAQs on the Internet on subjects as diverse as gardening and virtual reality.
FileManager
FileManager is a multi-user, Web-based file directory and remote command manager for Unix operating systems.
File Storage
A Web-based file storage application that allows you to store and share files securely, quickly and simultaneously via the Web.
Firewall
A firewall is a combination hardware and software buffer that many companies put in place between their internal networks and the Internet. A firewall allows only specific kinds of messages from the Internet to flow in and out of the internal network. This protects the internal network from intruders and/or prevents hackers from breaking into the systems.
Form Mail Scripts
Form Mail scripts let you create forms to place on your Web site that users can fill out. All results are then e-mailed to you to review.
FrontPage® 2002 Extensions
Microsoft® FrontPage® 2002 Server Extensions (FPSE) are used frequently by hosting providers to enable users to upload their FrontPage-created sites. Microsoft® FrontPage® is a Web site creation and management software tool that allows you to create and maintain Web sites.
FTP
File Transfer Protocol (FTP) allows you to upload files to your Web site from your computer. It's a necessity if you're using FrontPage or another Web site design software package to build and/or update your Web site. If you're using an online Web site design template provided by Network Solutions, you probably don't need FTP capability.
FTP Accounts
File Transfer Protocol is the method of transferring files between two computers and a method of gaining access to files stored in a remote computer.
Multi-User FTP gives you the ability to assign permissions to someone else to FTP pages to your site or you can even restrict it to a specific directory.

g

Guaranteed* Clicks
As part of a paid search advertising program, the number of times Network Solutions guarantees that your sponsored ads will be seen and clicked on per month.
Gigabyte (GB)
A measure of data storage and/or data transfer on your Web site.
1 Gigabyte = 1,000 Megabytes = 1,000,000 Kilobytes = 1,000,000,000 Bytes
For data storage and data transfer:
  • 1GB is roughly 33,000 Web pages stored or transferred (viewed)
  • 2GB is roughly 66,000 Web pages stored or transferred (viewed)
  • 3GB is roughly 99,000 Web pages stored or transferred (viewed)
Guestbook
A Guestbook allows your Web site visitors to digitally sign in and make comments about your site.

h

Hits
This term refers to the number of files that are downloaded from a Web server. Keeping track of hits is a way of measuring traffic to a Web site. The number of hits a site receives is usually much greater than the number of actual visitors. That's because a Web page can contain more than one file.
Homepage
Also referred to as a Web page, the home page is the starting point of a Web presence. It is a sort of table of contents for everything that is on the Web site, offering direct links to the different parts of the site.
Host
A host is any computer directly connected to a network that acts as a repository for services (such as e-mail, FTP, or World Wide Web) available for other computers on the network.
HyperText Markup Language (HTML)
A programming language used to build Web sites; it defines how the Web pages will look and how the visitor will be able to move around the Web site. It used to be that you had to know HTML to design and build a Web site. But today there are online templates and tools, as well as software packages, which allow you to build a Web site without knowing HTML.

i

ICANN
The Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for managing and coordinating the Domain Name System (DNS) to ensure that every address is unique and that all users of the Internet can find all valid addresses. It does this by overseeing the distribution of unique IP addresses and domain names. It also ensures that each domain name maps to the correct IP address. ICANN is also responsible for accrediting the domain name registrars.
Identity Based Encryption
A key protection technology, Identity Based Encryption (IBE) allows MessageGuard™ subscribers to send secure (encrypted) e-mail to recipients without a need to exchange keys, certificates or passwords. IBE uses 1024-bit encryption.
IMAP
(Internet Message Access Protocol) - IMAP is a client/server protocol in which e-mail is received and held for you by your Internet server. You can view just the heading and the sender of the mail and then decide whether to download the mail. You can sync e-mail with your Palm, Blackberry or other portable e-mail device. You can also create and manipulate folders or mailboxes on the server, delete messages etc. IMAP over SSL is also available for secure e-mail transmissions.
Index
The collection of information a search engine has that searchers can query against. With crawler-based search engines, the index is typically copies of all the Web pages they have found from crawling the Web. With human-powered directories, the index contains the summaries of all Web sites that have been categorized.
Instant Messenger™
Web-based instant messaging software that allows users connected to your site to have real-time conversations and send files between them.
Internet Bookmark Manager
Lets you save your bookmarked Web sites and send your bookmarks to friends and coworkers as e-mail attachments.
Intranet
An Intranet is like having your own private area on the Internet; you can post information to it and only those people whom you allow to access it can view it. Many organizations use Intranets to share information, such as company holidays, human resource policies or client files, with employees. It is especially useful if you have people from different offices working together.
IP Address
A unique, numeric identifier used to specify hosts and networks. Internet Protocol (IP) numbers are part of a global, standardized scheme for identifying machines that are connected to the Internet. Technically speaking, IP numbers are 32 bit addresses that consist of four octets, and they are expressed as four numbers between 0 and 255, separated by periods, for example: 216.168.224.69. IP allocation for the Americas, the Caribbean, and sub-Saharan Africa are currently handled by the American Registry for Internet Numbers.

j

Java
Java is a programming language developed by Sun Microsystems, Inc. to create executable content (i.e. self-running applications) that can be easily distributed through networks like the Internet. Developers use Java to create special programs that can be incorporated in Web pages to make them interactive.
JavaScript
JavaScript is a scripting language that allows dynamic behavior to be specified within HTML documents.
Java Servlets
Java Servlet technology provides Web developers with a simple, consistent mechanism for extending the functionality of a Web server and for accessing existing business systems.
Journal Manager
Powerful Web-based journal manager lets you share your journal entries with other people by defining unlimited guest accounts with configurable read/write/delete permissions.
JPEG
JPEG is an acronym for Joint Photographic Experts Group, an industry committee that developed a compression standard for still images. JPEG refers to the graphics file format that uses this compression standard. If you've ever received pictures over the Internet, they were probably in JPEG format.

k

Keywords
The actual words and terms that customers are using to search the Internet for products and services similar to yours.

l

LAN
An acronym for Local Area Network, LAN refers to a local network that connects computers located on the same floor or in the same building or nearby buildings.
Link Popularity
Search engines such as Google® find Web sites through links from other sites. The number of links and quality of links to the Web site affect the site's ranking on search engine results pages. Link popularity is a measure of how many high-quality Web sites link to your site. The quantity and quality of links into your site from other valuable sites are both important factors to increasing search engine rankings.
Logfile Access
This allows you to view the log files for performance as well as for the number of visitors to your site. Log files can be used for reporting purposes.
Login Name
A login name is the account name used to access a computer system. Also called user ID or user name, it is a way people identify themselves to their online service or Internet access provider.

m

Mailing List
A mailing list is a way of having a group discussion by electronic mail or distributing announcements to a large number of people. A mailing list is very much like a conference, except that the conversation comes to you in your e-mailbox. Each time you or any member of the list posts a reply to the conversation, it is distributed to the e-mailbox of every member of the list. All of this traffic is automated and managed by programs called mailing list managers (MLMs).
Malware
A generic term used to describe a variety of malicious software such as viruses, Trojan horses, worms, spyware, etc.
Media Streaming
Media Streaming allows for real-time transmission of audio and video files from your Web site. Network Solutions offers Windows Media Streams. One stream is equivalent to one current online listener.
Megabyte (MB)
A measure of data storage and/or data transfer on your Web site.
1 Megabyte = 1,000 Kilobytes = 1,000,000 Bytes
1,000 Megabytes = 1 Gigabyte
For data storage and data transfer:
  • 10MB is roughly 330 Web pages stored or transferred (viewed)
  • 20MB is roughly 660 Web pages stored or transferred (viewed)
  • 30MB is roughly 990 Web pages stored or transferred (viewed)
Message Board
Enables you to create your own message boards so that the users of your Web site can interact with each other.
MIME
MIME stands for Multipurpose Internet Mail Extension, a standard system for identifying the type of data contained in a file based on its extension. MIME is an Internet protocol that allows you to send binary files across the Internet as attachments to e-mail messages. These files include graphics, photos, sound and video files, and formatted text documents.
MonsterCommerce
Industry leading E-Commerce solutions provider. MonsterCommerce is the industry leader in web based ecommerce storefront systems.
Modem
Short for Modulator/Demodulator, a modem is a device that allows remote computers to communicate, to transmit and receive data using telephone lines.
MS Access - Windows
A fast and flexible relational database management system, developed by Microsoft, which utilizes SQL.
MS SQL Database - Windows
An advanced server-side relational database system, designed for corporate users or those with intensive transactions.
Multi-User Calendars
A multi user calendar is a powerful Web-based application that lets you integrate event scheduling, tasks, journals/diary, bookmarks, discussion forums and notes support in one unified platform.
MySQL
MySQL is most commonly used for Web applications and for embedded applications and has become a popular alternative to proprietary database systems because of its speed and reliability. MySQL can run on UNIX, Windows and Mac OS. MySQL is an open source RDBMS that relies on SQL for processing the data in the database. MySQL provides APIs for the languages C, C++, Eiffel, Java, Perl, PHP and Python.

n

.NET - Windows
A programming infrastructure created by Microsoft for building, deploying, and running applications and services that use .NET technologies, such as desktop applications and Web services.
NIC Handle
Each database record has a single field (its "handle"), which uniquely identifies it. The handle is always shown in parenthesis following the record's name, which is always first thing shown as is shown below. PUBLIC, JOHN Q (JQP13) The "JQP13" is the handle. To gather information on a particular handle, you can look it up by its handle with a handle-only search by using a leading "!" or by using the handle keyword. To use this handle keyword, just click the handle radio button below the provided search box.

o

Online Marketing
A general term referring to all types of marketing online, including use of search engines, banner ads, e-mail campaigns and other online media buys to drive visitors to your Web site. See 'Search Engine Marketing' for more.
Online Transactions (E-Commerce)
Refers to the general exchange of goods and services via the Internet.
Online Yellow Pages
Similar to traditional print Yellow Pages, Online Yellow Pages are directories of businesses, organized by business category and location.
Optimizing
Optimizing refers to making a Web site search-engine-friendly so it ranks as high as possible on search engine results listings. Also called Search Engine Optimization (SEO), optimizing includes finding relevant keywords to describe your products and services; writing Web site content in a specific way that includes these keywords; analyzing your Web site for technical and design problems that may keep search engines from seeing the entire Web site; and submitting your Web site to search engines and directories. SEO is a very specialized field and usually requires the assistance of an SEO expert to achieve optimal rankings.

p

Paid Advertising Campaign
The creation and monitoring of paid search advertising done on search engine networks such as Google® and Yahoo!®. Includes keyword development and monthly reports detailing the number of clicks on the paid ads and the cost-effectiveness of the campaign. Also known as sponsored advertising.
Paid Search Advertising
or Pay Per Click (PPC) Advertising helps an online business to attract qualified customers. The ads can be placed in various locations on search engine networks.
Pay Per Click (PPC) Advertising
or Paid Search Advertising helps an online business to attract qualified customers. The ads can be placed in various locations on search engine networks.
Password Protected Directories
For additional security you can create passwords on all directories for your Web site content.
Paypal®
Paypal® is an electronic payment tool that allows buyers and sellers to conduct transactions online without directly exchanging credit card information. Online sellers may be able to use PayPal® to process payments without opening a conventional merchant account.
PC hijacking
An attack on a network-connected Personal Computer (PC) that results in the attacker taking control of the PC remotely. Once remote control is established, the attacker can gain access to e-mail, passwords, and other data on the PC, as well as use the PC to carry out tasks without the owner's knowledge, such as send out spam e-mail. Such remote-controlled PCs are often referred to as "zombies."
Perl
Short for Practical Extraction and Report Language, Perl is a programming language with strong capability to process text. Commonly used for writing CGI Scripts.
Pharming
An attack on a domain name's DNS server that allows the attacker to acquire control of the destination of the domain name for a Web site. The attacker then redirects traffic trying to reach that site to another location.
Phishing
Phishing refers to fraudulent communications designed to deceive consumers into providing personal, financial, or account information, including account user name and password, credit card information, and social security number. These spam e-mails often create a false sense of urgency intended to provoke the recipient to take immediate action; for example, phishing e-mails frequently instruct recipients to "validate" or "update" account information or face cancellation.
Photo Albums
A Web-based, digital photo storage application allowing you to store and share digital photos securely, quickly and simultaneously via the Web.
PHP
A server-side, HTML-embedded, open source scripting language used to create dynamic Web pages. Network Solutions currently runs PHP version 4.
phpMyAdmin
PhpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the Web.
Point External Domains
Hosting accounts typically let you point to several external domains. The ability to point to external domains lets you assign different domains to a hosting package. For example janesbagels.com can point to def123.com.
Polls
You can create voting polls on your Web site to gauge your site visitors' opinions.
Post Office Protocol (POP, POP2 or POP3)
POP is a process that transfers your e-mail messages from our servers to your computer's hard drive. You can access your messages using an e-mail program installed on your computer. POP allows you to:
  • Use the e-mail software currently installed on your computer
  • Connect faster than the Web Mail option
  • Have unlimited storage
  • Compose and review messages while offline
Powerful 128-bit Encryption
128-bit encryption means that the data cryptographically encoded during an SSL session is at the highest level currently available, and nearly impossible to break. Compared to a 40-bit encrypted SSL Certificate, a 128-bit is more than 300 septillion (300,000,000,000,000,000,000,000,000) times stronger.
All SiteSafe™ SSL Certificates from Network Solutions are encrypted at 128 bits and can support higher or lower encryption levels as determined by the Web server or browser. In other words, if the Web server or browser is configured to support 256 bit encryption (e.g. Apache® 2 and Firefox®), then the secure session will be established at that level; alternatively, if the Web server or browser only supports 40 or 56-bit encryption, then the session will be established at that encryption level.
Private Registration
When you register a domain name, your address, e-mail and phone number are published in the public WHOIS database. ICANN requires this personal information to be available for anybody to view on the Web. Private registration allows you to use alternate contact information rather than your own personal information for the "WHOIS" database when registering a domain name.
Program (Programming)
An organized list of instructions that, when executed, causes the computer to behave in a predetermined manner. Without programs, computers are useless. A program is like a recipe. It contains a list of ingredients (called variables) and directions that tell the computer what to do. The variables can represent numeric data, text, or graphical images.
Provisioning Timing
Network Solutions provides a comprehensive validation process to ensure that a SiteSafe™ SSL Certificate is properly issued. Upon receipt of all required documentation, our four-step process is expedited within one business day with the purchase of SiteSafe SSL Pro or Wildcard Certificate, and two to four business days with the purchase of the SiteSafe SSL Basic or Site Confirm Seal.

r

Real Audio/Video Stream (10)
RealMedia streams allow for real-time transmission of audio and video files from your Web site. Network Solutions offers RealMedia streams. One stream is equivalent to one current online listener. See also 'Media Streaming' or 'Streaming Media' for more information.
Register Domain
To establish an Internet identity you need to have a domain name. In order to do this, you'll need to register a domain name. To do so, you can go to www.networksolutions.com and type your desired name in the search box and purchase an available domain.
Registry
The organization responsible for the administration and maintenance of a domain extension is known as the "registry". Organizations such as Network Solutions who register domain names are known as "registrars". Qualified registrars have access to the registry database to purchase or modify domain registrations on behalf of those that register a domain name (registrants).
Renew Services (Domain Name)
To protect your domain name registration, it's best to renew your services before the expiration date with a multi-year term. Network Solutions, LLC waives all liability in the loss of domain name registrations due to failure to renew services.

s

Script
A script is a type of program that consists of a set of instructions for another application or utility to use.
Search Engine
A tool allowing users to search for information on the Internet using key words and phrases. Search engines explore the Internet and return a list of Web pages that are related to the key words or phrases entered. Popular search engines include Google®, Alta Vista®, Ask Jeeves®, Excite, Hotbot, Lycos® and Yahoo!®. Search engines are also a tool to market your Web site to potential visitors
Search Engine Marketing (SEM)
Use search engines to let people know about your site and drive traffic to your site. When a person searches on a term that is related to your Web site, a brief description of your site with a link to it will appear in their search results. There are a number of different ways to approach Search Engine Marketing.
You can also pay to be listed on search results (in a different area from natural, non-paid search results) when a key word you designate is searched on. This is called 'paid placement' or 'paid search results.' Yahoo!® Sponsored Search and Google AdWords™ are two programs that allow you to pay for placement.
Search Engine Optimization (SEO)
Search Engine Optimization (SEO) makes your site more appealing to search engines and gives them a better understanding of who they should send to your site. Optimizing your Web site should result in a high placement in 'natural search results,' or in the area where companies aren't paying to be listed.
Search Engine Submission
This includes the submission of your Web site to search engines and a complete analysis of your site, identifying improvement on your Web site that can help your Web site get indexed by search engines more successfully.
Secure Web Site Seal (Free Secure Site Seal)
All Secure Link SSL Certificates include a free Secure Site Seal. Secure Site Seals provide you with a visible presence on your Web site that you are a trusted and secure Web site that lets visitors know that your Web site is trusted and secure when conducting online transactions. When your customers click or mouse-over your Secure Site Seal, they will see that your SSL Certificate and organization credentials are valid in real time.
Server Side Includes (SSI)
A type of HTML comment that directs the Web server to dynamically generate data for the Web page whenever it is requested. SSIs can also be used to execute programs and insert the results.
Shared SSL
Secure Socket Layer (SSL) is a protocol that provides encrypted communications on the Internet. This is used primarily for financial transactions that take place over the Internet. Shared SSL provides secure Web server access without requiring you to purchase a digital key. This means you will avoid additional cost, but you will be required to access your secure content in a form similar to the following: https://secure.networksolutions.com/username
Site Confirm Seal
Site Confirm Seals provide a visible presence on your Web site that lets visitors know that your site has been validated as a legitimate business. When your customers click or mouse-over your Site Confirm Seal, they will see that your organization's credentials are valid in real time. The Site Confirm Seal does not include an SSL Certificate or encryption. Please select from the SiteSafe SSL Certificates if you require SSL encryption.
SMTP
Simple Mail Transport Protocol (SMTP) is a protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, which let the user save messages in a server mailbox and download them periodically from the server. In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail.
Spam/Spam Filter
While originally used to refer to e-mail that was sent without explicit permission from the recipient, now it's used more broadly to refer to any unwanted e-mail. Spam filters attempt to identify spam e-mail and prevent it from being delivered to your inbox.
Sponsored Results / Sponsored Advertising
Listings on search engines such as Google® and Yahoo!® which are paid for by the sponsoring Web site. Also known as paid search advertising.
Spoofing
Spoofing is a general term for several different activities that involve disguising the source of a communication or the identity of a user. For example, spammers often attempt to cover their tracks through e-mail spoofing, in which the spam e-mail appears to originate from one source when in fact it was sent from another. Another type of spoofing can result from a PC hijacking, in which the attacker assumes the identity of the victim to gain access to privileged information and/or Web sites storing valuable data, such as online banking sites.
Spyware
Software unknowingly installed on a PC that secretly monitors the user's actions. Spyware can range from the benign, such as a cookie tracking a user's Internet habits, to the malicious, such as a PC hijacker.
SSL Certificate
SSL stands for "Secure Sockets Layer", which is the standard security technology for creating an encrypted link between a Web server and a Web browser. This link ensures that all data passed between the server and browser remains private and secure.
SSL Certificates serve two purposes:
  1. They assure customers that a Web site is legitimate and that the online business running the site is a real licensed business.
  2. They encrypt data transferred between a customer's Web browser and the online business to help prevent theft of sensitive information such as credit-card numbers, account numbers, and passwords.
The certificates are issued and validation assured by third-party companies called Certificate Authorities (CA). When a properly issued SSL Certificate is present on a Web site, the visitor's Web browser shows an image of a closed padlock and an "https" in front of the Web address.
SSL Certificate Replacement (Unlimited Reissues)
If at any time during the term of your SSL Certificate you need a certificate reissued due to a change with your Web hosting provider, Web server change, or other technical reason, Network Solutions will reissue your certificate for free.
Streaming Media
Streaming data refers to multimedia files, such as video clips and audio, that begins playing seconds after it is received by your computer from the World Wide Web. The media is delivered in a "stream" from the server so that you don't have to wait several minutes or longer to download multimedia files.
Sub-Domain/Directory Pointer
A directory pointer (or sub-domain) allows you to point that sub-domain to a particular page (or directory) of a Web site. For example, if you registered the domain name janesbagels.com, an example of a sub-domain would be specialpromotions.janesbagels.com. In this case the customer will go straight to the special promotions page instead of going to the main page of janesbagels.com.

t

Targeted Leads
A potential customer, searching for products and services similar to yours, who, while using search engines, clicks on one of your "sponsored links" developed as part of a paid search advertising campaign
Task Manager
Powerful Web-based task manager lets you enter tasks each day and provides alerts to keep your projects on time.
Template (Web site package)
In the context of a Web site, a template is a Web page that has been pre-formatted for your use, allowing you to build your own Web site quickly and affordably. The template provides a basic structure for the Web page: for example, a template might place navigation elements across the top of the page, provide a space for a graphic or logo in the upper left-hand corner, etc. Many of the template?s elements can easily be customized. For example, you can change the background color of the page, insert a graphic or logo of your choosing, change text colors and/or fonts, and more.
Transfer (Domain Names)
Network Solutions can accommodate all types of domain name transfers, but it is important to note that the term transfer is often defined differently by Internet Service Providers (ISPs), registrars, and customers.
The three most frequent types of transfers are: 1) Transferring your Network Solutions registered domain name to another provider's Domain Name Server (DNS). 2) Transferring your domain name registration within Network Solutions. 3) Transferring your domain name registration to Network Solutions.
Trojan (Trojan horse)
A malicious, security-breaking program disguised as something benign, sent to you over the Internet. For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit-card numbers, passwords and other information to a stranger, or lets that stranger hijack your computer to commit illegal attacks that can virtually cripple a whole network.

u

Unix
Pronounced yoo-niks, a popular multi-user, multitasking operating system developed at Bell Labs in the early 1970s. Created by just a handful of programmers, UNIX was designed to be a small, flexible system used exclusively by programmers.
Unix - MySQL Database
A fast and flexible relational database management system that utilizes SQL. SQL or Structured Query Language is a common language used to access databases.
Unlimited E-mail Forwarding
When you set up forwarding for your e-mail account, messages addressed to your e-mailbox are automatically sent to the other mailbox you choose. You can enter any valid e-mail address as a destination for your forwarded messages. You can also choose whether you want to keep copies of your forwarded messages.
Upgrade
An upgrade is an improvement to your existing package or software. By upgrading your package you usually get new features and functions.
URL
An acronym for Uniform Resource Locator, a URL is the address for a resource or site (usually a directory or file) on the World Wide Web and the convention that Web browsers use for locating files and other remote services.

v

Virus
Viruses are small files that attach to e-mails or download and infect your computer. They can be harmless (they place a funny picture on your monitor) or dangerous (they can go through your address book and send everyone within your address book the same virus). More dangerous viruses can wipe out your computer and all your information. Some viruses can take over your machine and send spam from your computer. Without your knowledge, you can become a spammer.
Virus Scanning
PC viruses can cripple your computer or wipe out your files, and e-mail is now a common method of computer virus transmission. E-mail from WGC Designs is set up to detect and clean viruses from all incoming messages and file attachments (including those that are compressed) before they get to your computer.

w

Web Design
The aesthetic and navigational architecture of a Web site.
Web Hosting
Web hosting is an online storage service for information, images, video, or any content accessible through the Web.
Web hosting package
Network Solutions' Web hosting packages are designed for the advanced needs of a technical user who wants to maintain one or more Web sites. All of our packages include generous amounts of disk storage and data transfer, FTP accounts, e-mailboxes, sub-domains and directory pointers, domain name (with annual agreement), secure hosting with 99.9% uptime, scripting and database functionality, site traffic reports, and your choice of Unix or Windows platform.
Web Mail
Web Mail allows you to access your e-mail account from anywhere using a Web browser. You should use Web Mail when you cannot access the computer that you have set up with POP access.
Web Page
A Web page is a document created with HTML (Hypertext Markup Language) that is part of a group of hypertext documents or resources available on the World Wide Web. Collectively, these documents and resources form what is known as a Web site. Web pages can contain hypertext links to other places within the same document, to other documents at the same Web site, or to documents at other Web sites. They can also contain fill-in forms, photos, large clickable images, sounds, and videos for downloading.
Web Site
A Web site is a collection of HTML documents or Web pages, that are linked together and that exist on the Web at a particular server. Exploring a Web site usually begins with the home page, which may lead you to more information about that site. A single server may support multiple Web sites.
Web Site Building Tools
Every hosting package includes ImageCafé® Web Site Creator, our premium Web site building tool. ImageCafé® Web Site Creator is a template based Web site design tool that lets you quickly and easily create a professional and customized Web site using our step-by-step wizard to select your design, color, theme and images.
Web Site Confirm Seal
Site Confirm seals provide you with a visible presence on your Web site that lets visitors know that your Web site is trusted and a legitimate business. When your customers click or mouse-over your Site Confirm seal, they will see that your organization's credentials are valid in real time.
Web site package
A Web site package includes all of the products and services you need to design, build, publish, and promote your Web site. All Network Solutions Web site packages include Web site hosting, a Web site address (domain name) (with annual agreement), e-mail addresses linked to the domain name (example: kate@kateskites.com), and various online marketing tools. In addition, depending on the type of package you select, the package may include design and maintenance by a professional Web designer or access to an easy-to-use Web site building tool including professionally designed Web page templates.
Web site traffic
The visitors who come to your Web site are collectively referred to you as your site's ?traffic.? You may find it helpful to use a page view counter to track how many visitors your site receives. More sophisticated tracking tools, such as SuperStats, compile Web site traffic reports on what sites your visitors come from when they arrive at your Web site, where they go within your Web site, and the activities they engage in on your site.
Web Trends® - Web Site Statistics - Windows
Industry leading Web site statistic tool that enables you to monitor your Web site's performance. Types of data include the number of hits, viewer locations, and peak browsing times.
Webalizer® - Unix - Web Site Statistics
Webalizer® is a Web server log file analysis program that enables you to monitor your Web site's performance. It produces usage reports that can be viewed in a standard Web browser.
WHOIS
WHOIS is a directory of domain name information. When you register a domain name, your postal address, e-mail address and phone number are automatically published in the public WHOIS database. The Internet Corporation for Assigned Names and Numbers (ICANN), the nonprofit body responsible for accrediting domain name registrars, requires that this personal information be accurate and available for anybody to view on the Internet.
Windows
Windows is short for Microsoft Windows.
Windows - .NET
A programming infrastructure created by Microsoft for building, deploying, and running applications and services that use .NET technologies, such as desktop applications and Web services.
Windows - ASP
Active Server Page is a server-side scripting technology that can be used to create dynamic and interactive Web applications. An ASP page is an HTML page that contains server-side scripts that are processed by a Web server before being sent to the user's browser.
Windows - MS Access
A fast and flexible relational database management system, developed by Microsoft, which utilizes SQL.
Windows - MS SQL Database
An advanced server-side relational database system, designed for corporate users or those with intensive transactions.
Windows - Web Site Statistics - Web Trends®
Industry leading Web site statistic tool that enables you to monitor your Web site's performance. Types of data include the number of hits, viewer locations, and peak browsing times.
Windows Media Streaming
Microsoft® Windows Media Streaming allows for real-time transmission of audio and video files from your Web site. Network Solutions offers Windows Media Streams. One stream is equivalent to one current online listener.
World Wide Web (WWW)
You can think of the Web as a worldwide collection of text and multimedia files and other network services interconnected via a system of hypertext documents. Http (Hypertext Transfer Protocol) was created as a means for sharing data internationally, instantly, and inexpensively. With hypertext, a word or phrase can contain a link to other text. To achieve this, CERN developed a programming language called HTML, which allows you to easily link to other pages or network services on the Web.
Worm
Worms are self-replicating malicious software programs designed to slow down Internet network traffic. Worms differ from regular computer viruses in that they do not need to infect other computer files to spread.
Yellow Pages
Internet Yellow Pages are online directories that let you list your business.

Support

  • Free Tech Support
  • Email, Text & Phone
  • Personalized Service
  • PDF Documentation
  • CMA Systems Included
  • Fast Changes & Updates
  • See All Tools & Help Articles

CONTACT US


Mailing Address
PO Box 544
Lebanon, NH 03766

Phone: (603) 443-6008
Fax: (520) 844-6008
Email: info(At)wgcdesigns.com