IT Terms tagged with 'Internet'
- Image Spam
- Koobface
- Activex Control
- Bookmark
- Bookmarklet
- Firefox
- Private Browsing
- Lightweight Browser
- Microbrowser
- Mosaic
- Tabbed Browsing
- Web Browser
- mIRC
- Acronym
- Botnet
- Contact List
- Chat
- Chat Room
- Flamebait
- New Media
- Presence
- Smiley
- Troll
- Smart Client
- Silicon Valley
- Digital Divide
- Offline
- Online
- Stateless Protocol
- Narrowcast
- MSN TV
- Broadband
- Browsing
- Keyword
- Query String
- Domain Name
- Domain Name Dispute
- Domain Name Registrant
- Domain Name Registrar
- Domain Parking
- Namespace
- Round Robin DNS
- DNS Zone File
- Black Friday
- Breadcrumb Navigation
- Click-and-Mortar
- Co-branding
- Comparison Shopping Engine
- Conversion Marketing
- Conversion Rate
- Cyber Monday
- eBay
- Electronic Billing
- Electronic Shopping Cart
- Email Thread
- Google Analytics
- Linkbait
- Natural Search
- Opt-In Email
- Referrer
- SEO Services
- Skyscraper Ad
- Social Shopping
- Trick Banner
- Unique Visitor
- Web Analytics
- Web Beacon
- Web Service
- Wugging
- Autoresponder
- Blacklist
- Email Alias
- Email Client
- Email Harvesting
- Email Server
- Email Signature
- Email Software
- Flame
- Hard Bounce
- Internet Fax
- List Hygiene
- LISTSERV
- Listwashing
- Mail Merge
- Piggyback Email
- Pink Contract
- Soft Bounce
- Spam
- Spamdress
- Whitelist
- Digital Certificate
- BitTorrent
- HTML5
- Animated GIF
- Fail Whale
- Adobe Flash
- Latency
- Switch
- Meta Tag
- 133T Speak
- Anycast
- Bogon
- Broadcast Address
- Censorware
- Citizen Journalism
- Cybercrime
- Cyberforensics
- Cyberbullying
- Cyberloafing
- Cyberpunk
- Cybersquatting
- Cyberveillance
- Darknet
- Digital Footprint
- Extranet
- Finger
- Firesheep
- Ghost Site
- Googlewhack
- Hacktivism
- Hop
- HTTP Request Header
- HTTP Response Header
- Ingress Traffic
- Internet
- Intranet
- Intranet Suite
- IP Multicast
- Keyword Stuffing
- Loopback Address
- Moved To Atlanta
- Multicast Address
- Net Neutrality
- Next Hop
- Peering
- Pierre Salinger Syndrome
- Ping
- Web Proxy Cache
- Static NAT
- Traceroute
- Tunnel Broker
- Unicast
- Unicast Address
- Whois
- ActiveMovie
- Add-On Manager
- Bandwidth Shaping
- IT Certification
- Collaborative Learning
- Connectile Dysfunction
- Cyberspace
- Cytizenship
- Domain Migration
- Federation
- Feed Aggregator
- Internet Desktop
- Link Checker
- Media Server
- Napster
- Route Control
- Shared Loop
- Virtual Identity
- Walled Garden
- Web Host
- iJack
- Hotspot
- Wireless Modem
- Jitter (VoIP)
- Hypermedia
- Backbone
- Name Server
- Backchannel
- Image Map
- Newsgroup
- USENET
- Online Service
- Apache Portals Project
- Avahi
- MySQL
- Flow Control
- Scripting Language
- Java Applet
- IP Address Blocking
- IP Spoofing
- Malicious Active Content
- Malvertising
- Nonrepudiation
- Nuker
- Obfuscated URL
- Packet Filtering
- Passive Reconnaissance
- Pharming
- Phishing
- Phreaking
- Ping Of Death
- Port Scanning
- Session Hijacking
- Sheepdip
- Sidejacking
- Slimeware
- Smitfraud
- SYN Attack
- Teardrop Attack
- Twishing
- Uberveillance
- Wardriving
- X.509
- Proxy Server
- Internet Software Piracy
- Portal Application
- Scareware
- G.727
- Protocol
- Avatar
- Link Farming
- A-list Blogger
- Blogroll
- Facebook Connect
- Social Media
- Social Network
- 301 Redirect
- 302 Redirect
- 303 Redirect
- Active Content
- Base URL
- Ping
- Blogosphere
- Dynamic Content
- Hosting Server
- Hosted Services
- Mirror Site
- Website Template
- Persistent Cookie
- Premium Content
- Rich Snippets
- Session Cookie
- Web 2.0
- Web 3.0
- Web Authoring
- Web Server
- Webmaster
- Facebook Group
- Microblog
- Captive Portal
- Evil Twin
- Social Routing
- Wireless Application Protocol (WAP) Gateway
- Backbone Provider
- Blogger
- Click Fraud
- Cobweb Site
- Facebook Forced Invite
- Facebook Mini-feed
- Facebook News Feed
- Facebook Wall
- Home Page
- Hyperlink
- Hypertext
- Linked Data
- Netscape Communications
- Spider
- Spider Trap
- Surfing
- Tag Cloud
- Typosquatting
- Web Log (Blog)
- Wiki
- Website Wireframe
- YouTube
- Tag
- Bandwidth
- Torrent
- Ethernet
- Host
- Address Bar
- Archie
- Cross-Browser
- DNS Record
- Firewall
- Flaming
- Gateway
- Gopher
- Mashup
- Netmask
- Packet
- Payload
- Session
- Site Map
- Slashdot Effect
- Spoofing
- Static Web Page
- Tunneling
- Tweet
- Unfriend
- Webmail
- Website
- Lossy
- Infotainment
- Network
- Podcast
- Remote User
- Viral
- CGI-Bin
- Digerati
- Leased Line
- Packet Switching
- Web
- Hit
- Push Technology
- X.25
- Annoybot
- Anonymous Login
- Application Layer
- Archive Site
- ASCII Art
- Asynchronous Transmission
- Attenuation
- Bad Frame Interpolation
- Bang Path
- Bounced Email
- Broadcasting
- Browser Caching
- Cancelbot
- Catenet
- Cell Relay
- ColdFusion
- CompuServe
- Cybercafe
- Cyberterrorism
- Datagram
- Dedicated IP Address
- Electronic Storefront
- Feedback Form
- FidoNet
- Font Foundry
- Host Name
- Hotlinking
- Cookie
- I-Mode
- Internet Access
- Internet Worm
- Internetworking
- Lurker
- Lurking
- Magic Cookie
- Email Filter
- Markov Chain
- MEDLINE
- Netscape Communicator
- Netscape Navigator
- Network Architecture
- Offline Browser
- Online Help
- Physical Layer
- Portico
- Presentation Layer
- DNS Resolver
- Rich Media
- Satellite Internet
- Softphone
- Static Internet Protocol Address
- T3 Line
- Topology
- Transport Layer
- Undernet
- Uptime
- Video Streaming
- Virtual Hosting
- Web Crawler
- Web Design
- Web Publishing
- Carnivore
- Eggdrop
- Mobile Code
- URL Encoding
- Boolean Search
- Fair Use
- Information Privacy
- xDSL
- Place Shifting
- Spambot
- Internet History
- Meta Search Engine
- Search Engine
- Googol
- HTTP Proxy
- Network Protocols
- PageRank
- Filler Text
- Portal (Internet)
- Reserved Address Space
- Rickrolling
- Safari
- Scunthorpe Problem
- Secure Connection
- Subdomain
- Clickjacking
- Content Spoofing
- Cyberwarfare
- Disposable Email
- Fennec
- Google Docs
- HoneyMonkey
- Identity Theft
- Mutual Authentication
- Online Backup
- Firefox Sync
- Wildcard Certificate
- Enterprise Search
- Real-Time Web Analytics
- Social Spreadsheet
- Telepresence Room
- Web-Based Project Management Software
- Planned Obsolescence
- Geotargeting
- Internet Metering
- Appliance Computing
- Cloud Cartography
- Aptent
- Arachniography
- Burn Rate
- Vannevar Bush
- Cyberstalking
- Transition Ad
- Geocaching
- Streaming Media
- URL Shortening
- Content Delivery
- Two-Tiered Internet
- Packet Loss
- Femtocell
- Anonymous Email
- Bacn
- Graylisting
- Hashtag
- Transactional Email
- Core Router
- eHealth Exchange
- HTTP 404
- Arachnotaxis
- Wayback Machine
- Banner Blindness
- Blogswarm
- Cybrarian
- DARPANET
- Dead Body Spam
- Domain Sniper
- Facebook Fan
- Facebook Like Button
- Facebook Event
- Facebook Insights
- Facebook Mobile
- Facebook Page
- Facebook Status
- Flash Mob
- Internet Addiction
- Masthead
- NAT64
- Pop-Up Ad
- Trap
- Virtual Community
- Webisode
- High-Speed Dialup
- Social Bookmarking
- Distributed Search
- Email Extractor
- Graynet
- Reseller Hosting
- Web Mapping
- Mobile Browser
- Non-Virtual Hosting
- Social Graph
- Bandwidth Test
- Web Counter
- Deep Web
- Domain Tasting
- E-Speak
- Fast Flux DNS
- Forward DNS
- Google Bomb
- Internet Map
- Smart Refrigerator
- Internet Time
- Minisite
- Port 80
- Web Server Security
- Screencast
- Shared Hosting
- Email Virus
- Coaxial Cable
- Cache Server
- Reverse Proxy Server
- DNS Cache Poisoning
- URL Rewriting
- Flooding
- File Sharing
- IP Camera
- Jigsaw
- Microcommerce
- Xanadu
- Internet Caller ID
- Content Farm
- Internet Meme
- Tim Berners-Lee
- Class A IP Address
- Full-Text Search
- Lag
- Superstitial
- Web Portal
- Backbone Cabal
- Baud Barf
- Bogon Filtering
- Cancelmoose
- Capacity
- Common Carrier
- Connectionless Protocol
- Cyberchondriac
- Data Link Layer
- Douglas Engelbart
- GEANT
- Hard Link
- Wireless Adapter
- Internet Backbone
- Link Rot
- Memex
- Message Switching
- Meta Element
- Organic Search
- Pull Media
- Seed
- Static Link
- Vanity Domain
- Webcasting
- Ad Blocker
- Ad Space
- Affiliate Tracking
- Marc Andreessen
- Anonymizer
- Anonymous Post
- Asynchronous Learning
- Bandwidth Hog
- Bandwidth Hugger
- Beehive Forum
- Blackholing
- Blended Networking
- Broken Link
- Browser Compatibility
- Caching Proxy
- Cybercide
- Dedicated Hosting
- Deep Linking
- Default Browser
- Delurking
- Disconnect Anxiety
- Dot-Con
- Virtual Credit Card
- Facebooking
- Flash Cookie
- Freemium
- Freshness Factor
- Google Blip
- Hacker Jargon
- Helper Application
- Hijackware
- Ideavirus
- Internal Link
- Internet Security
- Interweb
- Message Board
- Netwar
- Online Banking
- Paywall
- Proxy Surfing
- Real-Time Chat
- Root Server
- Scarecrow Technology
- Semantic Search
- Social Platform
- Spoof Website
- Synchronous Learning
- Third-Level Domain
- Tracking Cookie
- Vertical Portal
- View-Based Conversions
- Virtual Directory
- Web Content
- Web Content Syndication
- Web Development
- Website Usability
- Digital Identity
- Error Checking and Correction
- Internetworking Device
- Network Layer
- Mobile Search
- Data Charging
- Maemo
- Mobile Advertising
- Browser-Safe Palette
- Default Values - Database
- Voice XML
- XSS Hole
- White Label
- Web Log Software
- Cybersecurity
- Cyberattack
- Address Book
- Circuit-Level Gateway
- Network Security
- Broadcast Domain
- Deflection Routing
- Frame Check Sequence
- Shared Resources
- Prism
- Network Bottleneck
- Analog Data
- Digital Data
- Channel Capacity
- GNUnet
- SMS Phishing
- Optical Fiber Cable
- Subsidiary Rights
- Internet Privacy
- Internet2
- Cryptoanarchism
- Freedom of Information
- Internet Transit
- TiBook
- Multihoming
- Vertical Handover
- CoolTalk
- Qik
- Netiquette
- Network Science
- Network Theory
- Android Device
- Designated Router
- Legacy Network
- Hosts File
- Anonymity Network
- WebOS
- IEC Connector
- Integrated Search
- Cyberthreat
- Satellite Internet Access
- Tooway
- Heavy Internet Use
- Web Service
- File Hosting Service
- Supernet
- Wireshark
- Packet Capture
- Session State
- Web Form
- Computer Network
- Cyberlaw
- Internet Art
- Virtual World
- Information Processing
- Ambient Networks
- Zombie Cookie
- Secure Cookie
- Trojan Dialer
- Planking
- Chuck Norris Facts
- Voice Over Internet Protocol (VoIP) Packet Loss
- SPDY Protocol
- Dial-Up Connection
- Web-Based Application
- Internet Over Satellite
- Localhost
- Frameset
- T-3 Carrier
- T-1 Carrier
- IP Network
- Super-Speed Internet
- Satellite Broadband
- The Google+ Project
- Website Filter
- Dot-Com Boom
- Bluetooth
- Fire Walking
- Email Handler
- Egosurfing
- Online Advertising
- Online Marketing
- Kindle
- Direct Payment
- Online Comparison Shopping
- Online Fraud Protection
- Clipboard Hijacking Attack
- Amazon CloudWatch
- Amazon CloudFront
- Cloud Migration
- Production Server
- Application Portability
- Cloud
- Cloud Computing Manifesto
- Cloud Storage
- Community Cloud
- Internet Crime
- Google Apps
- Google Fusion Tables
- Hosted Desktop
- KnowledgeTree
- MobileMe
- OTOY
- Postini
- SRWare Iron
- Google Data Liberation Front
- Syncdocs
- Vertical Cloud
- Virtual ISP
- WaveMaker
- Windows Live
- Zoho Office Suite
- Comodo Dragon
- Coning
- Integration-Centric BPM
- Viral Video
- URL Snooping
- LimeWire
- Leisure Diving
- Lanham Act
- Owling
- Network Degradation
- orkut
- Google Bookmarks
- Batting
- Cyberluring
- Star Wars Kid
- Fail
- Oracle of Bacon
- JenniCam
- Hampster Dance
- Geocities
- Lifecasting
- Operation Shady Rat
- Digital Marketing
- Referral Partner
- Land Line
- Reintermediation
- Apple TV
- Search Engine Spider
- HTTP Header
- Zombie Network
- Parasite Hosting
- Base64
- Anonymous
- Triple Tag
- Peering Agreement
- Demand Progress
- Peering Exchange
- Quantcast
- Social Media Fatigue
- Deals Fatigue
- Follow Fatigue
- Horsemanning
- Degradation of Service Attack
- Stocking
- Google Talk
- Linkerati
- Tier 1 Carrier
- Choke Worm
- Bropia Worm
- Kelvir Worm
- Google Toolbar
- Facebook f8
- Content Scraping
- Location Dependent Services
- RSS Autodiscovery
- Googlewashing
- HTML5 Cookie
- HTML5 Local Storage
- Tourist Guy
- Hackerazzi
- Likejacking
- Amazon Whispernet
- Browser Wars
- SEO Platform
- Node Pole
- Socialbot
- Crowdsourcing
- Hacker Dojo
- Cyclades
- Online Survey
- Social Media Maven
- Facebook Insights Dashboard
- Facebook Stalking
- On-Demand Self Service
- Facebook Platform
- Windows Live Mesh
- Node.js
- Open Graph Protocol
- Merit Network
- MILNET
- READMAIL
- Facebook Questions
- Joseph Carl Robnett Licklider
- Ted Nelson
- Robert Kahn
- Vinton Cerf
- Raymond Tomlinson
- Intergalactic Computer Network
- All-Cloud Environment
- Bounce Rate
- Blogalogue
- Blogorrhea
- Auction Sniping
- Web 1.0
- Semantic Web
- DNS Hijacking
- Domain Hijacking
- Homepage Hijacking
- Page Hijacking
- Reverse Domain Hijacking
- Clickprint
- Cyberactivism
- Eyeball Driven
- Eyeball Hang Time
- Search Engine Traffic
- Landing Page
- Anonymization
- Intelligent Agent
- Search Engine Query
- Cantenna
- Cyberbeggar
- Cyberslacker
- Data Shadow
- Digital Native
- Dotsam
- E-Dundant
- Email Train
- Fauxtography
- Flashturbation
- Passive Attack
- Mobile Advertising Platform
- Spam Account
- Wikiality
- Clicktivism
- Semantic Repository
- Photobomb
- Photo Lurking
- Murfing
- Don't Be Evil Tool
- Slacktivism
- Showrooming
- Megaupload
- Click Tracking
- ROFLCon
- JFlow
- Bradying
- Don't Be Evil
- Facebook Timeline
- BITNET
- Magnet Link
- Googleplex
- WiMAX Release 2
- Facebook Messenger
- SoLoMo
- Google Play
- DNS Server
- Tweet Seat
- @reply
- Cord Cutting
- Filter Bubble
- Zerg Rush
- Google Knowledge Graph
- Nickelbacking
- Broadband Cap
- Rags
- Widows
- Orphans
- Core Switch
- Google Fiber
- Zucked
- Batmanning
- Heuristic Filtering
- Twiplomacy
- Gangnam Style
- OAuth 2.0
- Hosting
- Violentacrez
- Dark Social
- DNS Lookup
- DNS Hosting
- Sockpuppet
- Tweetup
- Digital Dualism
- Hashtag Activism
- E-Diplomacy
- Microsoft Account
- Social Media War Room
- Cloud Backup Service Provider
- White-Space Spectrum
- OpenMAMA
- Twitterverse
- Ghost Banning
- Kaepernicking
- Teoing
- Harlem Shake
- Selfie
- Bandwidth Analyzer
- Bandwidth Monitor
- SharePoint
- Facebook Shadow Profile
- Nymwar
- Resource Pooling
- Conversational Search
- Hummingbird
- Twitterstorm
- Virtual Sit-In
- Streisand Effect
- Cyberlibertarian
- Internet Vigilantism
- Proteus Effect
- Certificate Management
- Website Security Certificate
- Wildcard Secure Socket Layer Certificate (Wildcard SSL Certificate)
- SSL Certificate Authority
- Network Mapping
- Web Application Security Testing
- Network Traffic
- Web File Transfer
- HTTP File Transfer
- Online File Sharing
- Illegal File Sharing
- File-Sharing Service
- Internet Traffic Monitoring
- Internet Speed Test
- Website Monitoring
- Website Monitoring Software
- Mailing List
- Email Hosting
- Hosted Exchange
- SMTP Relay
- Website Traffic Monitoring
- Website Security Test
- Member Portal
- Industrial Internet
- Google Chrome
- Wireless Internet
- Internet Speed Monitor
- OpenSSL
- Folksonomy
- Broadband Router
- Martian Packet
- Web Server Architecture
- Data Feed
- Open Calais
- Ultra-High-Speed Broadband Internet
- Tag Management
- Internet Routing
- Social Search
- Social Web
- Socialcasting
- Subnet Number
- HIPAA-Compliant Email
- End-to-End Email Encryption
- Net-Liberated Organization
- Mobile Social Network
- Location-Aware Application
- Advanced Web Services
- Semantic Web Browser
- OpenDNS
- Collaborative Website
- Godwin’s Law
- Search Box
- Microsoft Edge
- One Percenter
- Hug of Death
- 411
- Bio-Break
- Cached Out
- Huge Pipes
- Mommy Save
- JSON-LD
- Google Juice
- Google Stalking
- Imaginary Internet Points
- Out of Band
- Plumbing
- Pointy-Haired
- Kopimism
- Always On
- Because Internet
- Dark Web
- Upvote
- Downvote
- Subreddit
- Cake Day
- Cheezburger
- Willy Wonka Meme
- Most Interesting Man In The World Meme
- Catfish
- E-Tailware
- Internesia
- Infomediary
- Like Baiting
- Mouse Potato
- Proxy Service
- Word Of Mouse
- Cornea Gumbo
- Jimmy Wales
- Wikipedia
- Engagement
- Persona
- Paul Baran
- Bob Taylor
- Leonard Kleinrock
- Donald Davies
- Steve Crocker
- Email Harvester
- B1FF
- Breidbart Index
- Jeff K.
- McQuary Limit
- Mojibake
- Postel's Prescription
- Screen Name
- Content Personalization
- Line Speed
- Data Plane
- Article Spinner
- Geoblocking
- Domain Authority
- Google Panda
- Browser Isolation
- Cryptojacking
- Ambient Backscatter
- Social Media Manager
- Evil Maid Attack
- Quantum Internet
- WebAssembly
- Robert Metcalfe
- Data Brokering
- IPv6 Over Low-Power Wireless Personal Area Networks (6LoWPAN)
- Address Record (A Record)
- Absent By Enforced Net Deprivation (ABEND)
- Area Border Router (ABR)
- Administrative Domain (AD)
- ActiveX Data Object.NET (ADO.NET)
- Asymmetric Digital Subscriber Line (ADSL)
- Away From Keyboard (AFK)
- Adobe Integrated Runtime (AIR)
- Army Knowledge Online (AKO)
- Alternate Text (Alt Text)
- Amazon Relational Database Service (Amazon RDS)
- Amazon Virtual Private Cloud (Amazon VPC)
- Advanced Message Queuing Protocol (AMQP)
- America Online (AOL)
- Asia Pacific Network Information Centre (APNIC)
- Authenticated Post Office Protocol (APOP)
- Advanced Research Projects Agency (ARPA)
- Advanced Research Projects Agency Network (ARPANET)
- Apache Software Foundation (ASF)
- Autonomous System Number (ASN)
- Application Service Provider (ASP)
- Advanced Technology Attachment (ATA)
- Asynchronous Transfer Mode (ATM)
- Acceptable Use Policy (AUP)
- Business Blog (b-blog)
- Broadband Remote Access Server (B-RAS)
- Business-to-Business (B2B)
- Business-to-Consumer (B2C)
- Business-to-Government (B2G)
- Back At Keyboard (BAK)
- Bandwidth Allocation Protocol (BAP)
- Braille and Audio Reading Download (BARD)
- Bulletin Board System (BBS)
- Blind Carbon Copy (BCC)
- Bidirectional Encoder Representations from Transformers (BERT)
- Broadband Global Area Network (BGAN)
- Browser Helper Object (BHO)
- Biological Internet (Bi-Fi)
- Black Hat Search Engine Optimization (Black Hat SEO)
- Blog Audience (Blaudience)
- Web Log Client (Blog Client)
- Bell Operating Company (BOC)
- Bastard Operator From Hell (BOFH)
- Bandwidth On Demand (BOND)
- Bootstrap Protocol (BOOTP)
- Business Payments Directory (BPD)
- Broadband Over Power Line (BPL)
- Be Right Back (BRB)
- Certificate Authority (CA)
- Communications Assistance For Law Enforcement Act (CALEA)
- Context-Aware Network (CAN)
- Completely Automated Public Turing Test To Tell Computers And Humans Apart (CAPTCHA)
- Committed Access Rate (CAR)
- Common Address Redundancy Protocol (CARP)
- Copyright Alert System (CAS)
- Computerized Bulletin Board System (CBBS)
- Creative Commons (CC)
- Carbon Copy (cc or c.c.)
- Country Code Top-Level Domain (ccTLD)
- Cisco Discovery Protocol (CDP)
- Collaborative Filtering (CF)
- Common Gateway Interface (CGI)
- Challenge Handshake Authentication Protocol (CHAP)
- Common Internet File System (CIFS)
- Children's Internet Protection Act (CIPA)
- Cyber Intelligence Sharing and Protection Act of 2011 (CISPA)
- Card Not Present (CNP)
- Communications Over Internet Protocol (CoIP)
- Co-location (Colo)
- Children's Online Privacy Protection Act of 1998 (COPPA)
- Cost Per Action (CPA)
- Cost Per Click (CPC)
- Customer Premises Equipment Device (CPE Device)
- Cost Per Lead (CPL)
- Computer Science Network (CSNet)
- Commerce Services Provider (CSP)
- Certificate Signing Request (CSR)
- Customer Self Service (CSS)
- Cisco Unified Computing System (CUCS)
- Download (D/L)
- Defense Advanced Research Projects Agency (DARPA)
- Dublin Core (DC)
- Dynamic Domain Name System (DDNS)
- Distributed Denial of Service (DDoS)
- Digital Enhanced Cordless Telecommunications (DECT)
- Default-Free Zone (DFZ)
- Dude, Just Google It (DJGI)
- DomainKeys Identified Mail (DKIM)
- Direct Message (DM)
- Domain-Based Message Authentication, Reporting and Conformance (DMARC)
- Digital Millennium Copyright Act (DMCA)
- Defense Message System (DMS)
- Domain Name System (DNS)
- Domain Name System Parking (DNS Parking)
- Domain Name System Security Extensions (DNSSEC)
- Digital Object Identifier (DOI)
- Dial Other Internet Providers (DOIP)
- Digital Subscriber Line (DSL)
- Digital Subscriber Line Access Multiplexer (DSLAM)
- Digital Simultaneous Voice and Data (DSVD)
- Digital Transmission Content Protection Over Internet Protocol (DTCP-IP)
- Distance Vector Multicast Routing Protocol (DVMRP)
- Dynamic Virtual Private Network (DVPN)
- Dynamic Internet Protocol Address (Dynamic IP Address)
- Dynamic Network Address Translation (Dynamic NAT)
- Electronic Ink (E Ink)
- Electronic Book (E-Book)
- Electronic Card (e-Card)
- E-Commerce Advisor (E-Com Advisor)
- Electronic Commerce (E-Commerce)
- Electronic Discovery (E-Discovery)
- Electronic Retailing (E-Tailing)
- Extensible Authentication Protocol (EAP)
- Electronic Book Exchange (EBX)
- Error Control (EC)
- Elastic Computing (EC)
- Electronic Civil Disobedience (ECD)
- Encyclopedia Dramatica (ED)
- eDonkey Network (eD2k)
- Electronic Frontier Foundation (EFF)
- Eris Free Network (EFNet)
- Electronic Funds Transfer System (EFTS)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Enterprise Information Integration (EII)
- Electronic Mail (Email)
- Telephone Number Mapping (ENUM)
- Electronic Publication (EPUB)
- Electronic Software Distribution (ESD)
- Extended Validation SSL (EV SSL)
- Extended Validation Secure Socket Layer (EVSSL)
- Friend-To-Friend (F2F)
- Favorite Icon (Favicon)
- Fiber Bragg Grating (FBG)
- Facebook Obsessive Compulsive Disorder (FBOCD)
- Fiber Channel over Internet Protocol (FCIP)
- Fiber Channel Over Ethernet (FCoE)
- Fiber Distributed Data Interface (FDDI)
- Federated Identity Manager (FIM)
- Fiber-Optic Service (FiOS)
- Facebook Immune System (FIS)
- Federal Internet Exchange (FIX)
- Federal Networking Council (FNC)
- Fax Over Internet Protocol (FoIP)
- Fully Qualified Domain Name (FQDN)
- File Transfer Protocol (FTP)
- Fiber to the Building (FTTB)
- Fiber to the Node (FTTN)
- Fiber To The Premises (FTTP)
- Fouled Up Beyond All Repair (FUBAR)
- Forward (FW)
- File Exchange Protocol (FXP)
- Great Firewall of China (GFW)
- Gigabit Point of Presence (GigaPOP)
- Global Internet Exchange (GIX)
- Google Plus (Google+)
- Google+ification (Google+ification)
- Global Threat Bot (GTbot)
- Generic Top-Level Domain (gTLD)
- High-Level Data Link Control (HDLC)
- Horizontal Enterprise Portal (HEP)
- Host Identity Protocol (HIP)
- High Performance Parallel Interface (HIPPI)
- Home Location Register (HLR)
- High-Ping Bastard (HPB)
- High Performance Computing Act of 1991 (HPCA)
- High-Speed Downlink Packet Access (HSDPA)
- Hosting Service Provider (HSP)
- Hope This Helps (HTH)
- Hypertext Markup Language (HTML)
- Hypertext Transfer Protocol (HTTP)
- Hypertext Transport Protocol Secure (HTTPS)
- Internet Architecture Board (IAB)
- Internet Assigned Numbers Authority (IANA)
- Internet Corporation for Assigned Names and Numbers (ICANN)
- Internet Content Adaptation Protocol (ICAP)
- Internet Connection Firewall (ICF)
- Internet Control Message Protocol (ICMP)
- Internet Connection Sharing (ICS)
- Information and Communications Technology (ICT)
- ISDN Digital Subscriber Line (IDSL)
- Internet Explorer (IE)
- Internet Engineering Task Force (IETF)
- Inline Frame (IFrame)
- Internet Inter-ORB Protocol (IIOP)
- Internet Information Services (IIS)
- Internet Information Services Certificate (IIS Certificate)
- Internet Key Exchange (IKE)
- Incumbent Local Exchange Carrier (ILEC)
- Instant Message (IM)
- Internet Message Access Protocol (IMAP)
- Interface Message Processor (IMP)
- Information Graphic (Infographic)
- Internet Network Operations Center (INOC)
- Internet Television (Internet TV)
- Internet Network Information Center (InterNIC)
- Internet of Everything (IoE)
- Internet of Things (IoT)
- Internet of Things Analytics (IoT Analytics)
- Internet of Things Gateway (IoT Gateway)
- Internet Protocol (IP)
- Internet Protocol Address (IP Address)
- Internet Protocol Hijacking (IP Hijacking)
- Internet Protocol Switching (IP Switching)
- Intellectual Property Attache Act (IP Attache Act) (IPPA)
- Internet Protocol Security (IPsec)
- Internet Protocol Version 4 (IPv4)
- Internet Protocol Version 4 Packet Header (IPv4 packet header)
- Internet Protocol Version 6 (IPv6)
- Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
- Internet Registry (IR)
- Internet Relay Chat (IRC)
- Internet Relay Chat Bot (IRC Bot)
- In Real Life (IRL)
- International Standard Book Number (ISBN)
- Internet Systems Consortium (ISC)
- Internet Streaming Media Alliance (ISMA)
- Internet Society (ISOC)
- Internet Service Provider (ISP)
- Internet Transaction Server (ITS)
- Internet Telephony Service Provider (ITSP)
- International Telecommunication Union (ITU)
- Internet Exchange Point (IXP)
- Java Message Service (JMS)
- JavaScript (JS)
- JavaServer Pages (JSP)
- Korea Scale (K-scale)
- Knowledge Base (klog)
- Link Aggregation (LAG)
- Local Area Network (LAN)
- Local Area Network (LAN) Emulation (LANE)
- Lightweight Directory Access Protocol (LDAP)
- LinkedIn (LI)
- Location/Identifier Separation Protocol (LISP)
- Laughing Out Loud (LOL)
- Low-Ping Bastard (LPB)
- Media Access Control (MAC)
- Metropolitan Area Network (MAN)
- Mobile Broadband System (MBS)
- Mobile Internet Device (MID)
- Mobile Instant Messaging (MIM)
- Multi-Purpose Internet Mail Extensions Type (MIME Type)
- Massively Multiplayer Online Game (MMOG)
- Multi-User Domain Object Oriented (MOO)
- Massive Open Online Course (MOOC)
- Modular Object-Oriented Dynamic Learning Environment (Moodle)
- Mobile Station International Subscriber Directory Number (MSISDN)
- Microsoft Network (MSN)
- Multiple System Operators (MSO)
- Microsoft Transaction Server (MTS)
- Mail Exchange Record (MX Record)
- Microsoft Exchange Server (MXS)
- National Automated Clearing House Association (NACHA)
- Network Access Point (NAP)
- Network Access Server (NAS)
- Network Address Translation (NAT)
- National Cybersecurity and Communications Integration Center (NCCIC)
- Network Control Protocol (NCP)
- Neighbor Discovery Protocol (NDP)
- Non-Delivery Report (NDR)
- Network Identity (Network ID)
- Next Generation Internet (NGI)
- Next Generation Network (NGN)
- Next Generation Nationwide Broadband Network (NGNBN)
- Network Interface Card (NIC)
- National Initiative for Cybersecurity Education (NICE)
- Navy Knowledge Online (NKO)
- Network Operations Center (NOC)
- National Science Foundation (NSF)
- National Science Foundation Network (NSFNet)
- Not Safe for Work (NSFW)
- Network Service Provider (NSP)
- Pseudonym (nym)
- Optical Carrier (OC)
- Online Certificate Status Protocol (OCSP)
- Online Certificate Status Protocol Stapling (OCSP Stapling)
- Open Internet (OI)
- Online Protection and Enforcement of Digital Trade Act (OPEN Act)
- Open-Source Virtual Private Network (OpenVPN)
- Open Rights Group (ORG)
- Organic Search Engine Optimization (Organic SEO)
- Online Reputation Management (ORM)
- Open Shortest Path First (OSPF)
- One-Time Password (OTP)
- Over-the-Top Application (OTT)
- OneWebDay (OWD)
- Web Ontology Language (OWL)
- Open Wireless Movement (OWM)
- Peer-to-Peer Architecture (P2P Architecture)
- Peer-To-Peer File Sharing (P2P File Sharing)
- Personal Address Book (PAB)
- Web Page (page)
- Pages Per Visit (Pages/Visit)
- Photonic Crystal Fiber (PCF)
- Permanent Link (Permalink)
- Privacy International (PI)
- Personally Identifiable Information (PII)
- Protocol-Independent Multicast (PIM)
- PROTECT IP Act of 2011 (PIPA)
- Photoblog (Plog)
- Portable Network Graphics (PNG)
- Point of Presence (POP)
- Post Office Protocol (POP)
- Pay Per Click (PPC)
- Pay Per Lead (PPL)
- Point-to-Point Tunneling Protocol (PPTP)
- Promoting and Enhancing Cybersecurity and Information Sharing Effectiveness Act of 2011 (PRECISE Act of 2011)
- Persistent URL (PURL)
- Page View (PV)
- Queries-per-Second (QPS)
- Registration Admission Status (RAS)
- Regional Broadband Global Area Network (RBGAN)
- Real-Time Blackhole List (RBL)
- Remote Control (RC)
- Remote Deposit Capture (RDC)
- Resource Description Framework (RDF)
- Reverse DNS (rDNS)
- Request for Comments (RFC)
- Radio Frequency Identification Tagging (RFID Tagging)
- Remote File Sharing (RFS)
- Right-Hand Side Blacklist (RHSBL)
- Rich Internet Application (RIA)
- Routing Information Protocol (RIP)
- Regional Internet Registry (RIR)
- Real Life (RL)
- Remote Monitoring (RMON)
- Radio Over Internet Protocol (RoIP)
- Ruby On Rails (RoR)
- Really Simple Syndication (RSS)
- Resource Reservation Protocol (RSVP)
- Retweet (RT)
- RTP Control Protocol (RTCP)
- Read The F###ing Manual (RTFM)
- Real-Time Transport Protocol (RTP)
- Secure MIME (S/MIME)
- Software as a Service (SaaS)
- Service Advertising Protocol (SAP)
- Session Border Controller (SBC)
- Secure Digital Music Initiative (SDMI)
- Service Delivery Platform (SDP)
- Symmetric Digital Subscriber Line (SDSL)
- Search Engine Rank (Search Rank)
- Search Engine Marketing (SEM)
- Search Engine Optimization (SEO)
- Search Engine Results Page (SERP)
- SIP for Instant Messaging and and Presence Leveraging Extensions (SIMPLE)
- Session Initiation Protocol (SIP)
- Stock-Keeping Unit (SKU)
- Second-Level Domain (SLD)
- Social Media Analytics (SMA)
- Storage Management Initiative Specification (SMI-S)
- Social Media Optimization (SMO)
- Simple Mail Transfer Protocol (SMTP)
- Social Network Analysis (SNA)
- Simple Network Management Protocol (SNMP)
- Social Networking Site (SNS)
- Start of Authority (SOA)
- Service-Oriented Architecture Repository (SOA Repository)
- Simple Object Access Protocol (SOAP)
- Social Computing (SoC)
- Synchronous Optical Networking (SONET)
- Stop Online Piracy Act (SOPA)
- Sender Policy Framework (SPF)
- Spam Over Internet Telephony (SPIT)
- Split Domain Name System (Split DNS)
- Search Plus Your World (SPYW)
- Secure Shell (SSH)
- Secure Sockets Layer (SSL)
- Secure Sockets Layer Certificate Authority (SSL Certificate Authority)
- Secure Socket Layer Checker (SSL Checker)
- Secure Socket Layer Encryption (SSL Encryption)
- Secure Socket Layer Server (SSL Server)
- Secure Socket Layer Test (SSL Test)
- Secure Socket Layer Unified Communications Certificate (SSL UCC)
- Secure Socket Layer Virtual Private Network (SSL VPN)
- Static Internet Protocol (Static IP)
- Set-Top Box (STB)
- Internet Standard (STD)
- Semantic Web Agreement Group (SWAG)
- Tablet Commerce (T-Commerce)
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- Tier 1 Internet Service Provider (Tier 1 ISP)
- Top-Level Domain (TLD)
- Too Long Didn't Read (TLDR)
- Telnet (TN)
- The Pirate Bay (TPB)
- True Ultimate Standards Everywhere (TRUSTe)
- Upload (U/L)
- User Agent Server (UAS)
- Unified Communications Certificate (UCC)
- Unified Communications and Collaboration (UCC)
- Unsolicited Commercial Email (UCE)
- Universal Description Discovery and Integration (UDDI)
- Usenet Death Penalty (UDP)
- User Datagram Protocol (UDP)
- Uniform Domain-Name Dispute-Resolution Policy (UDRP)
- User Group (UG)
- User-Generated Content (UGC)
- Unbundled Network Elements-Platform (UNE-P)
- Uniform Resource Identifier (URI)
- Uniform Resource Locator (URL)
- U.S. Computer Emergency Readiness Team (US-CERT)
- U.S. Cyber Command (USCYBERCOM)
- Universally Unique Identifier (UUID)
- Value-Added Network (VAN)
- Visitor-Based Networking (VBN)
- Very High Speed Backbone Network Service (vBNS)
- Virtual Channel Identifier (VCI)
- Very-High-Bitrate Digital Subscriber Line (VDSL)
- Very High Speed Digital Subscriber Line (VDSL)
- Vertical Enterprise Portal (VEP)
- Verizon Fiber Optic Service (Verizon FiOS)
- Video Chat (VidChat)
- Virtual IP Address (VIPA)
- Virtual Internet Service Provider (VISP)
- Video Blog (Vlog)
- Voice Over Instant Messenger (VoIM)
- Voice Over Internet Protocol Caller Identification (VoIP Caller ID)
- Voice Over Internet Protocol Gateway (VoIP Gateway)
- Voice Over Internet Protocol Phone (VoIP Phone)
- Voice on the Net (VON)
- Voice Over Wireless Fidelity (VoWi-Fi)
- Virtual Private Network (VPN)
- Virtual Reality (VR)
- Video SEO (vSEO)
- Video Teleconferencing (VTC)
- Virtual Teletype (VTY)
- World Wide Web Consortium (W3C)
- Web Access Management (WAM)
- Web Application Meets Brick And Mortar (WAMBAM)
- Wide Area Network (WAN)
- Wireless Application Service Provider (WASP)
- Web-Based Training (WBT)
- Web Content Management (WCM)
- Web-Based Distributed Authoring and Versioning (WebDAV)
- Web Operations (WebOps)
- Web Real-Time Communications (WebRTC)
- White Hat Search Engine Optimization (White Hat SEO)
- Broadband Wireless Access (Wibro)
- Windows Internet Naming Service (WINS)
- Wireless Internet Service Provider (WISP)
- Wireless Internet Service Provider Roaming (WISPr)
- Web-Oriented Architecture (WOA)
- Web of Things (WoT)
- WordPress (WP)
- Web Proxy Autodiscovery Protocol (WPAD)
- WIPO Performances and Phonograms Treaty (WPPT)
- Web Request Broker (WRB)
- Web Services Interoperability Organization (WS-I)
- White Space Device (WSD)
- Web Services Description Language (WSDL)
- World Wide Web (WWW)
- Cross-Post (X-Post)
- Extensible 3D Graphics (X3D)
- Xerox Network Systems (XNS)
- Yet Another Hierarchically Officious Oracle (Yahoo)