Active Directory
Active Directory (AD) is a Windows OS directory service that facilitates working with interconnected, complex and different network resources in a unified manner.

Application Log
The Application log records events logged by programs. For example, a database program might record a file error in the Application log. Program developers decide which events to monitor.

ASP.NET
ASP.NET is Microsoft’s technology to allow web developers to create dynamic web applications. ASP.NET is helpful to create anything from ecommerce website, small applications to large applications.

Bandwith
Bandwidth refers to the amount of data that website visitors can download from your website in a month

Blog
A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.

CGI
The common gateway interface (CGI) is a standard way for a Web server to pass a Web user’s request to an application program and to receive data back to forward to the user.

Connection String
connection string is a string that specifies information about a data source and the means of connecting to it. It is passed in code to an underlying driver or provider in order to initiate the connection. Whilst commonly used for a database connection, the data source could also be a spreadsheet or text file.

Crystal Report
Crystal Reports is a business intelligence application used to design and generate reports from a wide range of data sources. Several other applications, such as Microsoft Visual Studio, bundle an OEM version of Crystal Reports as a general purpose reporting tool. Crystal Reports became the de facto report writer when Microsoft released it with Visual Basic.

Database
A database is an application that manages data and allows fast storage and retrieval of that data.

Disk Space
Disk space refers to the amount of hard disk space you have available to store web pages, photos, videos and other content on your website.

DKIM
DomainKeys Identified Mail (DKIM) allows anybody, often the sender, to digitally sign an email. The DKIM signature is associated with a domain name and can be validated using a public record stored in the DNS (which maps domain names, such as "about.com", to numerical addresses of computers connected to the internet).

DNS
DNS stands for Domain Name System. The DNS is the system by which all Internet service addresses are created, maintained, and used

DNS lookup
A DNS Lookup is when a device that supports IP asks a DNS server for the IP address associated with a domain name. The DNS Server must "look up" the IP associated with that domain name.

Domain Alias
Domain Aliases allows you to assign more than one domain name to one web site with Action you can have an unlimited number of domains pointing to a single web site.

Domain Backorder
Domain Backorders is a service that helps you attempt to acquire a domain name when it becomes available for registration.

Domain Controller
Domain controller (DC) is a server that responds to security authentication requests (logging in, checking permissions, etc.) within the Windows Server domain.

Domain Name
A domain name is an Internet Address that will uniquely identify your website. You might have visited websites such as http://www.google.com, http://www.microsoft.com or http://www.yahoo.com. These are all examples of Domain names. With a Domain Name, you are allowed to have an e-mail address such as [email protected] To see if your Virtual Domain is available, and is not used by anybody else, please, visit InterNICs WHOIS database, and type in the domain name of your choice. If there will be no match, you are can register that domain name, otherwise you have to choose another one

Domain Registrar
A company designed to provide domain registrationservice to other companies or individuals that would like to own a particular web address.

Event Log Manager
An event log manager (ELM) is an application that tracks changes in an organization’s IT infrastructure. These change are reflected in logs, or ’audit trails,’ that must be produced for a compliance audit. Logs must be accurate, verifiable records of events like unsuccessful login attempts, granting or removal of access privileges or email backups.

Event Viewers
Event Viewer allows you to monitor events in your system. It maintains logs about program, security, and system events on your computer. You can use Event Viewer to view and manage the event logs, gather information about hardware and software problems, and monitor Windows security events. The Event Log service starts automatically when you start Windows. All users can view application and system logs.

FTP
FTP is an acronym for File Transfer Protocol. As the name suggests, FTP is used to transfer files between computers on a network. You can use FTP to exchange files between computer accounts, transfer files between an account and a desktop computer, or access online software archives.

Hostname
Hostname is the term for the label that is assigned to any device connected to a computer network and is used to identify the device across the web. A hostname usually consists of a single word or phrase and can be followed by a Domain Name System domain at the end.

HTTP
the Hypertext Transfer Protocol - provides a standard for Web browsers and servers to communicate. The definition of HTTP is a technical specification of a network protocol that software must implement.

HTTPMail
HTTPMail is a mail access protocol that allows you to access your mail from the server and leaves the email on the server. HTTPMail provides similar functionality to IMAP, where by an Outlook Express or Outlook client can access and manage messages and folders on the server. Unlike IMAP, it does not require SMTP to send messages.

HTTPS
HTTPS stands for HyperText Transfer Protocol over SSL (Secure Socket Layer). It is a TCP/IP protocol used by Web servers to transfer and display Web content securely. The data transferred is encrypted so that it cannot be read by anyone except the recipient.

IIS
IIS is Microsoft’s business-class Web server. Although Apache boasts more total worldwide installations than IIS, many corporations choose IIS as their Web server because it is supported by a commercial organization. Some have criticized IIS in the past, though, for its alleged security weaknesses.

IMAP
Short for Internet Message Access Protocol, a protocol for retrieving e-mail messages. The latest version, IMAP4, is similar to POP3 but supports some additional features. For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.

IMAP4
IMAP4 is a mail protocol that allows users to be disconnected from the main messaging system and still be able to process mail. Users can store messages on a local machine or on a server.

ISAPI Filter
ISAPI filter - A replaceable DLL which the server calls whenever there is an HTTP request. When the filter is first loaded, it communicates to the server what sort of notifications will be accepted. After that, whenever a selected event occurs, the filter is called to process the event.

Mailing List
A mailing list is a list of people who subscribe to a periodic mailing distribution on a particular topic. On the Internet, mailing lists include each person’s e-mail address rather than a postal address

MIME Types
MIME stands for Multipurpose Internet Mail Extensions. MIME type tells the browser or user agent what type of program various file types and extensions are.

ODBC
ODBC (Open Data Base Connectivity) is an interface to access databases via SQL queries. ODBC can be used as an access tool to various databases such as MS-Access, dBase, DB2, Excel, and Text.

Ping
Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests.

POP
POP stands for Post Office Protocol, and is one of the technologies used for that all-important medium of communication: email. Like many other computer-related things, email requires a special language for mail to be received or sent. POP is one of the technologies that allows email sent from anywhere in the world to arrive in your inbox.

POP Retrieval
The POP Retrieval Service will download mail via POP from a remote POP server and deliver to a local mailbox. Users are able to configure their own settings from Webmail. This means you can retrieve your emails from different mail accounts and view it on their local mailbox without having to log in to each separate account

RDP
Remote Desktop Connection is a technology that allows you to sit at a computer (sometimes called the client computer) and connect to a remote computer (sometimes called the host computer) in a different location

Security Log
The Security log records security events, such as valid and invalid logon attempts, and events related to resource use, such as creating, opening, or deleting files or other objects. The Security Log helps track changes to the security system and identify any possible breaches to security. For example, attempts to log on the system might be recorded in the Security log, if logon and logoff auditing are enabled.

Session State
Session state, in the context of .NET, is a method keep track of the a user session during a series of HTTP requests. Session state allows a developer to store data about a user as he/she navigates through ASP.NET web pages in a .NET web application.

Shared IP
A shared IP is simply an IP address that is shared by many users. This is transparent to website visitors and helps greatly reduce the cost of hosting your website.

SharePoint
SharePoint is a Microsoft’s product which connects the information with the people in each level of the business.

SMTP
The protocol used for email on the Internet. It defines a message format and a procedure to route messages through the Internet from source to destination via email servers.

SPAM
Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.

SPF
SPF (Sender Permitted From) is a new machanism which allows you to define what ip addresses are permitted to send mail ’from’ your domain, this will stop spammers from pretending to send message from your domain.

SQL Server Reporting Services
SQL Server Reporting Services (SSRS) is a server-based report generation software system from Microsoft. It can be used to prepare and deliver a variety of interactive and printed reports.

SSL
Stands for "Secure Sockets Layer." SSL is a secure protocol developed for sending information securely over the Internet. Many websites use SSL for secure areas of their sites, such as user account pages and online checkout. Usually, when you are asked to "log in" on a website, the resulting page is secured by SSL.

Static IP
A static IP address is an IP address that was manually configured for a device, verses one that was assigned via a DHCP server.

SubDomain
Subdomain is an extension of your domain. For example, your site is www.example.com. A subdomain would be something like test.example.com, and another would be webhosting.example.com. Subdomain is usually treated as a separate site from the main domain site

SyncML
An open standard protocol for synchronizing data between corporate servers, Web servers, desktops, laptops and handhelds. One of its primary applications is configuring remote devices.

System Log
The System log records events logged by the Windows 2000 system components. For example, the failure of a driver or other system component to load during startup is recorded in the System log. The event types logged by system components are predetermined by Windows.

Telnet
Telnet is a program that runs on the computer and connects PC to a server on the network and the protocol used on the internet or local area networks.

URL encoding
URL encoding stands for encoding certain characters in a URL by replacing them with one or more character triplets that consist of the percent character "%" followed by two hexadecimal digits. The two hexadecimal digits of the triplet(s) represent the numeric value of the replaced character.

URL Rewrite
URL rewriting, is the process of altering (often automatically by means of a program written for that purpose) the parameters in a URL (Uniform Resource Locator).

Virtual Directory
A virtual directory is a friendly name, or alias, either for a physical directory on your server hard drive that does not reside in the home directory, or for the home directory on another computer.

Web Application
A web application is any application that uses a web browser as a client. The application can be as simple as a message board or a guest sign-in book on a website, or as complex as a word processor or a spreadsheet.

Web Hosting
web hosting service is a type of Internet hosting service that allows individuals and organizations to make their website accessible via the World Wide Web.

Web Matrix
Web Matrix is the latest Microsoft technology for Web Development community. It helps you to develop and deploy your ASP.Net application and SQL database in a single click. If you’re using WebMatrix, make sure that your web hosting company offers you WebMatrix Compatible hosting.

Webmail
Webmail is an email service that uses a web browser to allow viewing, sending, receiving, editing & deleting of email, just as you would with standard email clients such as Outlook or Eudora. Webmail is ideal for mobile users because it allows you to access your email from anywhere, anytime with any computer connected to the Internet.

Whois
Whois is a protocol used to find information about networks, domains and hosts. The whois records normally include data on the organizations and the contacts associated with these networks and domains.