Welcome to the Creative Hive

The Hive is Zest Media's customer portal allowing customers to download invoices, track progress and raise support requests

Please log in using your Hive Username and Password

Please contact Victoria at the office if you do not have a password.

Member Login

Not a member yet? Sign Up!

Zest! Media Contact Us


Zest! Media - Get In touch

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Access Database
For experienced database programmers and first-time database users alike, Microsoft Access delivers powerful tools for managing and analyzing data. With XML support, developers can create sophisticated enterprise-wide database solutions that integrate easily with our range of Windows Servers.

back to top  
  ADSL
Asymmetrical Digital Subscriber Line (ADSL) enables the copper wire that carries the telephone signal into your home or office to transfer information in and out up to 30 times faster than you're used to. About a third of all homes and businesses can potentially use a broadband connection over copper wire.

back to top  
ADSL Modem
ADSL modems provide access to the internet via your ADSL connection. The internet connection is permanently open, so there's no need to dial up every time you want to browse the web, send emails or check messages.

back to top  

Applet
A small Java program that can be embedded in an HTML page. Applets differ from full-fledged Java applications in that they are not allowed to access certain resources on the local computer, such as files and serial devices (modems, printers, etc.), and are prohibited from communicating with most other computers across a network. The common rule is that an applet can only make an Internet connection to the computer from which the applet was sent.

back to top

ATM
(Asynchronous Transfer Mode) a new communications standard that is currently in the later stages of development. ATM is designed to transfer voice, video, and other multimedia data that requires short bursts of large quantities of data that can survive small losses but must be broadcast in real time.

back to top
Backbone
A high-speed line or series of connections that forms a major pathway within a network. The term is relative as a backbone in a small network will likely be much smaller than many non-backbone lines in a large network.

back to top
Bandwidth
How much stuff you can send through a connection. Usually measured in bits-per-second. A full page of English text is about 16,000 bits. A fast modem can move about 57,000 bits in one second. Full-motion full-screen video would require roughly 10,000,000 bits-per-second, depending on compression.

back to top
Bit (Binary DigIT)
A single digit number in base-2, in other words, either a 1 or a zero. The smallest unit of computerized data. Bandwidth is usually measured in bits-per-second.

back to top
Blog (weB LOG)
A blog is basically a journal that is available on the web. The activity of updating a blog is "blogging" and someone who keeps a blog is a "blogger." Blogs are typically updated daily using software that allows people with little or no technical background to update and maintain the blog.

Postings on a blog are almost always arranged in chronological order with the most recent additions featured most prominantly.

back to top
Bps
(Bits Per Second) speed at which data transfer is measured.

back to top
Broadband
Broadband is a general term for technologies like cable modems, ADSL, wireless data and ATM. Broadband basically opens up the networks to provide virtually unlimited bandwidth. The most complex multimedia content comes streaming down the line as fast as you can click. Broadband means having much more speed to move your data - much more than you can get out of a conventional 56K modem.

back to top
Browser
An piece of software which allows you to view web sites, usually Netscape Navigator or Microsoft Internet Explorer.

back to top

Byte
A set of Bits that represent a single character. Usually there are 8 Bits in a Byte, sometimes more, depending on how the measurement is being made.

back to top
CGI (Common Gateway Interface)
A set of rules that describe how a Web Server communicates with another piece of software on the same machine, and how the other piece of software (the ?CGI program?) talks to the web server. Any piece of software can be a CGI program if it handles input and output according to the CGI standard.
See also: Server, WWW

back to top
Cgi Bin
The most common name of a directory on a web server in which CGI programs are stored.

back to top
Client
A software program that is used to contact and obtain data from a Server software program on another computer, often across a great distance. EachClient program is designed to work with one or more specific kinds of Server programs, and each Server requires a specific kind of Client. A Web Browser is a specific kind of Client. See also: Browser, Client, Server

back to top  
Co-location
Most often used to refer to having a server that belongs to one person or group physically located on an Internet-connected network that belongs to another person or group. Usually this is done because the server owner wants their machine to be on a high-speed Internet connection and/or they do not want the security risks of having the server on their own network.

back to top  

Contention Ratio
All ADSL lines – regardless of service provider - are subject to contention, meaning that the network bandwidth available is shared between a number of subscribers. The ratio to which the available bandwidth is shared between users is called the "contention ratio". All UK providers, including BT, are subject to the same contention ratios. Services targeted at casual home users are frequently cheaper, but have a higher contention ratio. This means that the available network capacity is shared between a greater number of users. Business services have a lower contention ratio, which will provide a more consistent level of performance. A 50 to 1 contention ration means the bandwidth may be shared with up to 50 other subscribers, whereas a 20 to 1 contention ration means the bandwidth may be shared with no more than 20 other subscribers.

back to top

Cookies
Cookies are small files deposited onto your computers' hard drive when you visit a website. This enables the site to know who you are if you return to the site at some later stage. Some websites will not allow you to view them if your computer settings prevent these file deposits. If you have a problem accessing a particular site, disabling your computers' cookie prevention measures can sometimes solve the problem.

back to top
Database: MYSQL
MySQL is a highly regarded database engine which supports virtually all of the functionality of vastly more expensive database servers such as Oracle. The data is accessed using standard SQL. The following links will be of use to you:

For general information about MySQL please see www.mysql.com
We recommend this PHP MySQL administration software available from http://www.phpmyadmin.net/ This software can be used to create tables, add data from text files and carry out almost all database administration.

back to top  
Database: SQL
Our Servers currently support SQL Server 2000 and SQL Server Express 2005.

Microsoft SQL Server is built from the ground up as a scalable, high-performance database management system designed specifically for the unique requirements of distributed client-server computing. SQL Server has been fulfilling this role in business-critical environments for several years. Microsoft SQL Server exceeds dependability requirements and provides innovative capabilities that increase employee effectiveness, integrate heterogeneous IT ecosystems, and maximize capital and operating budgets.
Microsoft SQL Server provides the enterprise data management platform your organization needs to adapt quickly in a fast-changing environment.

back to top  
Dial-up
How most people connect to the internet by using their phone. Every time you want to get onto the internet your computer has to dial into the service. This is how most home users use the internet. It's an intermittent use of the internet instead of the always-on service supplied via by ADSL.

back to top  
DNS (Domain Name System)
The Domain Name System is the system that translates Internet domain names into IP numbers. A "DNS Server" is a server that performs this kind of translation.

back to top  

Domain name
Your domain name is the official name of your web site and appears in your web and email addresses. For all but the big brands, it's a good idea to choose a name that gives people some idea as to what you do - like www.sportswearcompany.co.uk. Domain names always have two or more parts, separated by full stops. The part on the left is the most specific, and the part on the right is the most general. Some of the most common domains are : .com (commercial), .edu (educational), .net (network operations), .gov (government), .org (organisations), .ltd (limited companies) and .co.uk. These last ones are usually used to denote a uk-based business but can also be used for individuals. When choosing a domain name, be imaginative. If sportswearcompany.co.uk is not AVAILABLE, try swc.com or sportswearco.net or even sports-wear.com.

back to top  


Domain Name Extensions
This table explains the meaning of the Domain name extensions

  Details
.co.uk The usual option if you trade mainly in the United Kingdom, indicates a UK base.
.ltd.uk UK based companies that are registered LTD's only. Please email or call to register.
.org.uk The usual choice for non-profit-making organisations based in the UK.
.me.uk Introduced in 2002 as a domain for personal use aimed at UK National persons.
.com Gives an 'international' status with no obvious indication as to where the company is based.
.net A popular choice for those who cannot register the .com of their choice.
.org The usual choice - non-profit-making organisations, and again carries a global appeal.
.biz A global domain introduced in 2001, .biz is for businesses or business ideas in development.
.info A global domain introduced in 2001, .info is available for all uses.
.tv none yet
.uk.com An alternate UK registration. A good option if the .com or .co.uk name is not available.
.uk.net An alternate UK registration. A good option if the .net name is not available.
.gb.net An alternate UK registration. A good option if the .com or .co.uk name is not available.
.gb.com An alternate UK registration. A good option if the .com or .co.uk name is not available.
.eu.com NOTE: This is not the official .eu domain but a viable alternative for an EU company.
.us.com none yet

back to top  
Email
For many businesses, email has all but replaced fax, post - and even the phone. It's easy to use, doesn't interrupt, and leaves messages that are easy to pick up any time. Bear in mind that whatever your domain name is, your email address will use it. So if you buy swc.com, then your email address will be something@swc.com. There are 2 main sorts of email accounts, specific and catch-all. A specific account is something like david@swc.com, and any deviation from this will be lost, whereas a catch-all account collects everything on the domain, so it will pick up david@swc.com, dvid@swc.com, dave@swc.com and even kdu33882ftej@swc.com.

back to top
Emoticons
These are the sideways smiles and frowns used in email to indicate emotions. E.g. :-) would indicate a smile and :-( would indicate a frown!

back to top  
Ethernet
A method of managing data traffic, or information, across a local area network.

back to top  
Extranet
A secure link between two or more intranets that allows businesses and other organisations to work together and share files.

back to top
Firewall
A device that fences off your private network from the outside world of the internet. It's the security guard at the gate. You need one of these to prevent hackers from using the internet to break in and steal sensitive information from your company.

back to top  
Frames
A way of splitting up a web page so that each opened box can operate independently.

back to top
FTP (File Transfer Protocol)
A very common method of moving files between two Internet sites. FTP is a way to login to another Internet site for the purposes of retrieving and/or sending files. There are many Internet sites that have established publicly accessible repositories of material that can be obtained using FTP, by logging in using the account name "anonymous", thus these sites are called "anonymous ftp servers".

FTP was invented and in wide use long before the advent of the World Wide Web and originally was always used from a text-only interface.

back to top
Gateway
The technical meaning is a hardware or software set-up that translates between two dissimilar protocols, for example America Online has a gateway that translates between its internal, proprietary e-mail format and Internet e-mail format. Another, sloppier meaning of gateway is to describe any mechanism for providing access to another system, e.g. AOL might be called a gateway to the Internet.

back to top  
GIF (Graphic Interchange Format)
A common format for image files, especially suitable for images containing large areas of the same color. GIF format files of simple images are often smaller than the same file would be if stored in JPEG format, but GIF format does not store photographic images as well as JPEG

back to top  

Gigabyte
1000 or 1024 Megabytes, depending on who is measuring.

back to top
 
Hit
As used in reference to the World Wide Web, "hit” means a single request from a web browser for a single item from a web server; thus in order for a web browser to display a page that contains 3 graphics, 4 “hits” would occur at the server: 1 for the HTML page, and one for each of the 3 graphics.

back to top
Home Page (or Homepage)
Several meanings. Originally, the web page that your browser is set to use when it starts up. The more common meaning refers to the main web page for a business, organization, person or simply the main page out of a collection of web pages, e.g. "Check out so-and-so's new Home Page."

back to top  
Host
Any computer on a network that is a repository for services available to other computers on the network. It is quite common to have one host machine provide several services, such as SMTP (email) and HTTP (web).

back to top
Hosting: Secure
Our Servers offer SSL (Secure Sockets Layer) encryption for your website when using one of our secure servers.
To save you the time and hassle of registering your own secure certificates we have registered the certficates under the safeserver.co.uk and safehosting.net domain names. This service is available to all customers and is compatible with CGI/PHP as our domains are run on a Linux server.

In order to access your webpages under SSL you will need to use the secure server prefix we provide you after signing up for this service. eg

https://www.safeserver.co.uk/domain/ or https://www.safehosting.net/domain/

Where www.domain.com is your domain name.

This will display a padlock in the corner of your browser indicating the pages are being displayed under SSL encryption. Depending on browser setup this may also display the security alert
" You are about to view pages over a secure connection Any information you exchange within this site cannot be viewed by anyone else on the web"

back to top  
HTML (HyperText Markup Language)
The coding language used to create Hypertext documents for use on the World Wide Web. HTML looks a lot like old-fashioned typesetting code, where you surround a block of text with codes that indicate how it should appear. The "hyper" in Hypertext comes from the fact that in HTML you can specify that a block of text, or an image, is linked to another file on the Internet. HTML files are meant to be viewed using a "Web Browser".

back to top  


HTTP (HyperText Transfer Protocol)
The protocol for moving hypertextfiles across the Internet. Requires a HTTP client program on one end, and an HTTP server program on the other end. HTTP is the most important protocol used in the World Wide Web (WWW).

back to top

Hyperlink
In World Wide Web pages, hyperlinks are highlighted text or images which, when selected (usually by clicking the mouse button), follow a link to another page. Hyperlinks can also be used to automatically download other files as well as sounds and video clips.

back to top

Hypertext
Generally, any text that contains links to other documents - words or phrases in the document that can be chosen by a reader and which cause another document to be retrieved and displayed.

back to top
IMAP (Internet Message Access Protocol)
IMAP is gradually replacing POP as the main protocol used by email clients in communicating with email servers. Using IMAP an email client program can not only retrieve email but can also manipulate message stored on the server, without having to actually retrieve the messages. So messages can be deleted, have their status changed, multiple mail boxes can be managed, etc.

back to top
Intranet
A private network that uses the same technology as the web, but is restricted to company use. All the benefits of the web inside your business.

back to top
IP (internet protocol)
The method for moving information from one network to another on the internet. An IP address uniquely identifies every site on the internet. Every website has an IP address associated with it.

back to top  
  ISDN
Stands for Integrated Services Digital Network and provides dial-up services at up to twice the speed of standard telephone connections. ISDN has provided a fast-access option in the run up to broadband over the past few years, but is now expensive and difficult to use by current ADSL standards.

back to top
ISP
Internet Service Provider, a company that uses one or more servers to give you access to the web. The best ISPs offer much more than this - including web site design, web hosting and technical support. www.webperf.net is the place to go to see the best performing ISP's in the country.

back to top
Java
Java is a network-friendly programming language invented by Sun Microsystems. Java is often used to build large, complex systems that involve several different computers interacting across networks, for example transaction processing systems.

Java is also becoming popular for creating programs that run in small electronic devicws, such as mobile telephones. 

A very common use of Java is to create programs that can be safely downloaded to your computer through the Internet and immediately run without fear of viruses or other harm to your computer or files. Using small Java programs (called "Applets"), Web pages can include functions such as animations,calculators, and other fancy tricks.

back to top

JavaScript
JavaScript is a programming language that is mostly used in web pages, usually to add features that make the web page more interactive. When JavaScript is included in an HTML file it relies upon the browser to
interpret the JavaScript. When JavaScript is combined with Cascading Style Sheets(CSS), and later versions of HTML (4.0 and later) the result is often
called DHTML.

back to top  

JPEG (Joint Photographic Experts Group)
JPEG is most commonly mentioned as a format for image files. JPEG format is preferred to the GIF format for photographic images as opposed to line art or simple logo art.

back to top
Kb (kilobyte)/Kbit(s)
Just over a thousand bits or bytes (It's a "you say potato" kinda thing). A 56Kbit/s modem runs at a maximum speed of 57,344 bits a second. A 5Kb file contains more than 5,000 bytes of information. You can also have megabits/bytes (more than a million), gigabits/bytes (more than 100 million) and terabits/bytes (more than 1,000 million). An ADSL modem can process up to 2 million bits per second

back to top

LAN (Local Area Network)
Usually represents a building network where computers are physically connected by cables.

back to top

Leased Line
Refers to line such as a telephone line or fiber-optic cable that is rented for exclusive 24-hour, 7-days-a-week use from your location to another location. The highest speed data connections require a leased line.

back to top  

Linux
A widely used Open Source Unix-like operating system. Linux was first released by its inventor Linus Torvalds in 1991. There are versions of Linux for almost every available type of computer hardware from desktop machines to IBM mainframes. The inner workings of Linux are open and available for anyone to examine and change as long as they make their changes available to the public. This has resulted in thousands of people working on various aspects of Linux and adaptation of Linux for a huge variety of purposes, from servers to TV-recording boxes.

back to top

Mb (megabits)
Over one million bits of information.

back to top

Mbps (megabits per second)
The amount of information that can be transmitted per second measured in megabits, i.e., 2mbps = transmission of over two million bits of information per second.

back to top
Megabyte
A million bytes. Actually, technically, 1024 kilobytes.

back to top  

Meta Tag
A specific kind of HTML tag that contains information not normally displayed to the user. Meta tags contan information about the page itself, hence the name ("meta" means "about this subject") Typical uses of Meta tags are to include information for search engines to help them better categorize a page.

You can see the Meta tags in a page if you view the pages' source code.

back to top

Mirror
Generally speaking, "to mirror" is to maintain an exact copy of something. Probably the most common use of the term on the Internet refers to "mirror sites" which are web sites, or FTP sites that maintain copies of material originated at another location, usually in order to provide more widespread access to the resource. For example, one site might create a library of software, and 5 other sites might maintain mirrors of that library.

back to top

Modem (MOdulator, DEModulator)
A device that connects a computer to a phone line. A telephone for a computer. A modem allows a computer to talk to other computers through the phone system. Basically, modems do for computers what a telephone does for humans.

back to top  

MYSQL DATABASE
(SEE DATABASES)

back to top
Netscape
A WWW Browser and the name of a company. The Netscape (tm) browser was originally based on the Mosaic program developed at the National Center for Supercomputing Applications (NCSA).

back to top  

NIC (Network Information Center)
Generally, any office that handles information for a network. The most famous of these on the Internet was the InterNIC, which was where most new domain names were registered until that process was decentralized to a number of private companies. Also means "Network Interface card", which is the card in a computer that you plug a network cable into.

back to top
Currently no content

back to top
Packet
Information moves around the Internet in 'packets'; chunks of data each with their own destination address. Think of packets as sealed envelopes containing data, with addresses written on them. They all go through the system, and usually end up at the correct destination. The more envelopes the system must handle, the slower the process becomes.

back to top
Packet Switching
The method used to move data around on the Internet. In packet switching,all the data coming out of a machine is broken up into chunks, each chunk has the address of where it came from and where it is going. This enables chunks of data from many different sources to co-mingle on the same lines, and be sorted and directed along different routes by special machines along the way. This way many people can use the same lines at the same time. You might think of several caravans of trucks all using the same road system. to carry materials

back to top  
Password
A code used to gain access (login) to a locked system. Good passwords contain letters and non-letters and are not simple combinations such as
virtue7.

back to top
Ping
To check if a server is running. From the sound that a sonar systems makes in movies, you know, when they are searching for a submarine.

back to top

PGP
PGP Mail encrypts email, files, and instant messages and also provides the ability to manage PGP keys. This can be used to encrypt emails containing credit card details when sending over the net. PGP credit card forms can be used as an alternative (and reletively cheaper) to having a fully blown eccommerce website where you require additional things from you bank (Merchant Number).

back to top  

What is PGP?
PGP (also called "Pretty Good Privacy") is a computer program that encrypts (scrambles) and decrypts (unscrambles) data. For example, PGP can encrypt "Andre" so that it reads "457mRT&%$354." Your computer can decrypt this garble back into "Andre" if you have PGP. Who uses PGP encryption [or other RSA-based systems]?

People who value privacy use PGP. Politicians running election campaigns, taxpayers storing IRS records, therapists protecting clients' files, entrepreneurs guarding trade secrets, journalists protecting their sources, and people seeking romance are a few of the law abiding citizens who use PGP to keep their computer files and their e-mail confidential.

Businesses also use PGP. Suppose you're a corporate manager and you need to e-mail an employee about his job performance. You may be required by law to keep this e- mail confidential. Suppose you're a saleswoman, and you must communicate over public computer networks with a branch office about your customer list. You may be compelled by your company and the law to keep this list confidential. These are a few reasons why businesses use encryption to protect their customers, their employees, and themselves.

PGP also helps secure financial transactions. For example, the Electronic Frontier Foundations uses PGP to encrypt members' charge account numbers, so that members can pay dues via e-mail.

How does PGP work?

PGP is a type of "public key cryptography." When you start using PGP, the program generates two "keys" that belong uniquely to you. Think of these keys as computer counterparts of the keys in your pocket. One PGP key is SECRET and stays in your computer. The other key is PUBLIC. You give this second key to your correspondents. Here is a sample PUBLIC KEY:


- - - -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.7

mQA9Ai2wD2YAAAEBgJ18cV7rMAFv7P3eBd/cZayI8EEO6XGYkhEO9SLJOw+DFyHg
Px5o+IiR2A6Fh+HguQAFEbQZZGVtbyA8ZGVtb0B3ZWxsLnNmLmNhLnVzPokARQIF
EC2wD4yR2A6Fh+HguQEB3xcBfRTi3D/2qdU3TosScYMAHfgfUwCelbb6wikSxoF5
ees9DL9QMzPZXCioh42dEUXP0g== =sw5W
- - - -----END PGP PUBLIC KEY BLOCK-----

Suppose the PUBLIC KEY listed above belongs to you and that you e-mail it to me. I can store your PUBLIC KEY in my PGP program and use your PUBLIC KEY to encrypt a message that only you can read. One beauty of PGP is that you can advertise your PUBLIC KEY the same way that you can give out your telephone number. If I have your telephone nber, I can call your telephone; however, I cannot answer your telephone. Similarly, if I have your PUBLIC KEY, I can send you mail; however, I cannot read your mail.

This PUBLIC KEY concept might sound a bit mysterious at first. However, it becomes very clear when you play with PGP for awhile.

back to top

Plug-in
A (usually small) piece of software that adds features to a larger piece of software. Common examples are plug-ins for the Netscape® browser and web server. Adobe Photoshop® also uses plug-ins.

back to top

POP
Point Of Presence. Relates to the number you dial to connect to an ISP. Good ISPs will now provide a point of presence via a local or freephone number to enable you to make internet calls at minimal cost.

back to top
Currently no content

back to top

Raid
This is when data is written to one disk and then automatically written simultaneously to one or more other disks, such that if one disk fails the other can carry on serving content with no loss of service.

back to top
Router
Routers are traffic cop computers on Internet backbones responsible for redirecting data from sender to receiver. When major routers slow down or stop, it has an adverse affect on Internet data flow in that region.

back to top

Search Engine
A (usually web-based) system for searching the information available on the Web. Some search engines work by automatically searching the contents of other systems and creating a database of the results. other search engines contains only material manually approved for inclusion in a database, and some combine the two approaches

back to top

Secure Hosting
(SEE HOSTING)

back to top

Security Certificate
A chunk of information (often stored as a text file) that is used by the SSL protocol to establish a secure connection.

back to top

SEO (Search Engine Optimization)
The practice of designing web pages so that they rank as high as possible in search results from search engines.

There is "good" SEO and "bad" SEO. Good SEO involves making the web page clearly describe its subject, making sure it contains truly useful information, including accurate information in Meta tags, and arranging for other web sites to make links to the page. Bad SEO involves attempting to deceive people into believing the page is more relevant than it truly is by doing things like adding inaccurate Meta tags to the page.

back to top

Server
A computer, or a software package, that provides a specific kind of service to client software running on other computers. The term can refer to a particular piece of software, such as a WWW server, or to the machine on which the software is running, e.g. "Our mail server is down today, that's why e-mail isn't getting out."
A single server machine can (and often does) have several different server software packages running on it, thus providing many different servers to clients on the network.

Sometimes server software is designed so that additional capabilities can be added to the main program by adding small programs known as servlets.

back to top

Servlet
A small computer program designed to be add capabilities to a larger piece of server software. Common examples are "Java servlets", which are small programs written in the Java language and which are added to a web server. Typically a web server that uses Java servlets will have many of them, each one designed to handle a very specific situation, for example one servlet will handle adding items to a "shopping cart", while a different servlet will handle deleting items from the "shopping cart."

back to top
Service Level Agreement
The agreement between Zest! Media and a customer that sets out what services will be delivered, how problems will be resolved and services maintained.

back to top  
SMTP (Simple Mail Transfer Protocol)
The main protocol used to send electronic mail from server to server on the Internet. SMTP is defined in RFC 821 and modified by many later RFC's.

back to top  
Spam (or Spamming)
An inappropriate attempt to use a mailing list, or USENET or other networked communications facility as if it was a broadcast medium (which it is not) by sending the same message to a large number of people who didn?t ask for it. The term probably comes from a famous Monty Python skit which featured the word spam repeated over and over. The term may also have come from someone?s low opinion of the food product with the same name, which is generally perceived as a generic content-free waste of resources. (Spam® is a registered trademark of Hormel Corporation, for its processed meat product.)

back to top
SQL (Structured Query Language)
A specialized language for sending queries to databases. Most industrial-strength and many smaller database applications can be addressed using SQL.

back to top
SSL Certificates: Geotrust
If you’re looking for end-to-end Internet security coverage, True BusinessID from GeoTrust is the answer.

- Identity verification Smart Seal - embedded company name/date/time stamp
- Compatible with 98% of all browsers
- Full 128-bit encryption technology

This bundled package of SSL and True Site delivers unsurpassed browser and server recognition as well as airtight access protection and fraud prevention. The most secure encryption technology you can buy.
True BusinessID is the only next generation web trust service that combines state-of-the-art 128-bit SSL encryption and identity verification in a single bundle. That means a new level of online security for both you and your customers, and a corresponding increase in business activity and revenue generated by your web site. 

Getting started with True BusinessID is hassle-free. We’ll provide easy-to-follow online installation instructions so you can put True BusinessID to work right away. We will even notify you of renewal requirements in advance so you can be sure that your True BusinessID is always operating at optimal levels – seamless protection for your online business, and important 24x7 assurance for your customers.

back to top
SSL Certificates: Thawte
What is a SSL Web Server Certificate?


With a Thawte SSL Web Server Certificate on your website, any information sent to your web server is encrypted or scrambled, making it impossible to intercept or steal. It also displays the identity of the website owner, and the name of the independent authority who verified that identity, such as Thawte. The Thawte Web Server Certificate connects at 128 bit, 56 bit or 40 bit depending on the client's browser capability.A SSL Web Server Certificate enables your customers to view the following information:- The domain for which the certificate was issued. This allows them to check that the SSL Web Server Certificate was issued for your domain (URL).

- The owner of the certificate. This acts as further reassurance, since customers are able to see whom they are doing business with.
- The physical location of the owner. Once again this reassures customers that they are dealing with an actual entity.
- The validity dates of the certificate. This is extremely important, since it shows users that your SSL Web Server Certificate is current.

Why do I need a SSL Web Server Certificate?

Many online transactions fail at the last minute when consumers consider the potential risks of entering their credit card and other personal information, or when it is not clear whether it is safe to download code from your site. Utilizing Thawte's digital SSL (Secure Sockets Layer) 'handshake', based on the leading security protocol on the Internet, you and your customers can rest assured that all online communications are secure while the information is being transmitted. Securing the transmission of information to your business holds obvious benefits, as does signifying that you are a trustworthy online organization. The tried-and-tested technology of Thawte's SSL Web Server Certificate protects against password and information interception, ensuring that your online relationship with your customers will be one based on trust.

What's in it for me?

It's all about trust -- by utilizing Thawte's SSL Web Server Certificate you are sending a clear signal to your customers. They know that the information they submit will not be intercepted while in transit, and that you are a verified, real-world organization.

Why choose a Thawte Server Certificate?

Thawte's certification practices are of the highest standard. We believe that excellent authentication and verification procedures are absolutely essential in order to ensure trust on the Internet. As a truly international organization in the best sense, Thawte takes great pride in its world-beating solutions.

back to top  
SQL Database
(SEE DATABASES)

back to top
Statistics
(SEE WEB STATISTICS)

back to top
TCP/IP (Transmission Control Protocol/Internet Protocol)
This is the suiteof protocols that defines the Internet. Originally designed for the UNIX operating system, TCP/IP software is now included with every major kind of computer operating system. To be truly on the Internet, your computer must have TCP/IP software.

back to top  
Terabyte
1000 gigabytes

back to top
TLD (Top Level Domain)
The last (right-hand) part of a complete Domain Name. For example in the domain name www.matisse.net ".net" is the Top Level Domain. There are a large number of TLD's, for example .biz, .com, .edu, .gov,
.info, .int, .mil, .net, .org, and a collection of two-letter TLD's corresponding to the standard two-letter country codes, for example, .us, .ca, .jp, etc.

back to top  

Trojan Horse
A computer program is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. For example a program that appears to be a game or image file but in reality performs some other function. The term "Trojan Horse" comes from a possibly mythical ruse of war used by the Greeks sometime between 1500 and 1200 B.C. A Trojan Horse computer program may spread itself by sending copies of itself from the host computer to other computers, but unlike a virus it will (usually) not infect other programs.

back to top
Unix
A computer operating system (the basic software running on a computer, underneath things like word processors and spreadsheets). Unix is designed to be used by many people at the same time (it is multi-user) and has TCP/IP built-in. It is the most common operating system for servers on the Internet. Apple computers' Macintosh operating system, as of version 10 ("Mac OS X"), is based on Unix.

back to top  

URL (Uniform Resource Locator)
The term URL is basically synonymous with URI. URI has replaced URL in technical specifications.

back to top
Virus
A chunk of computer programming code that makes copies of itself without any concious human intervention. Some viruses do more than simply replicate themselves, they might display messages, install other software or files, delete software of files, etc. A virus requires the presence of some other program to replicate itself. Typically viruses spread by attaching themselves to programs and in some cases files, for example the file formats for Microsoft word processor and spreadsheet programs allow the inclusion of programs called "macros" which can in some cases be a breeding ground for viruses.

back to top  
VPN (Virtual Private Network)
A method of sending data securely across a public network.

back to top
Web Forwarding
Web Forwarding will automatically redirect any visitors to your domain to the specified website. This is useful if, for example, your website is hosted with a free hosting provider, but you wish to have some of the benefits of your own domain name without the hosting costs. There are 2 types of Web Forwarding, Cloaked and Un-Cloaked. The are clear advantages and dis-advantages to these services.

back to top  
Web Forwarding: Cloaked
The advantage of this service is that the URL is preserved. Using the above example, 'www.yourdomain.com' would still redirect to the other site, but the URL in the browser will stay as 'www.yourdomain.com', hiding the fact that the website is hosted elsewhere.

back to top  
Web Forwarding: Un-Cloaked
The disadvantage of the basic service is that the URL will change. For example, if you redirected 'www.yourdomain.com' to 'http://www.freesites.com/~yourdomain/' then the first URL would be replaced with the second when the browser is redirected.

back to top  
WAN (Wide Area Network)
Wide area networks connect sites around the country or the world. A metropolitan area network (MAN) links sites around a city or large university.

back to top  
Web Caching
Web caching is a way of storing web pages so that they can be accessed at will without having to go the original source each time. Pages are stored 'higher up the chain' and become 'locally available'.

back to top  
Web Mail
Unlike email, where you access mail via a program like Outlook Express, web mail services such as Hotmail or Freeserve allow to receive and send mail from anywhere in the world. A Zest! Media webmail facility is included free of charge with every email account.

back to top  
Webopedia
A website dedicated to explaining the terms used in the Internet industry - found here

back to top    
Web Statistics: Webalizer
Webalizer is a web server log file analysis program which produces usage statistics in HTML format for viewing with a browser.
The results are presented in both columnar and graphical format, which facilitates interpretation.
Yearly, monthly, daily and hourly usage statistics are presented, along with the ability to display usage by site, URL, referrer, user agent (browser), username, search strings, entry/exit pages, and country.

back to top  
Worm
A worm is a virus that does not infect other programs. It makes copies of itself, and infects additional computers (typically by making use of network connections) but does not attach itself to additional programs; however a worm might alter, install, or destroy files and programs.

back to top
Currently no content

back to top
Currently no content

back to top
Currently no content