6
Glossary
Getting started with technology is not an easy task, and the last thing you need to worry about is terminology. Our glossary is a dictionary of the terminology used in the tech space, defined in the context of modern applications.
A
Account Management
What Is Account Management Account management is, in fact, the art of relationships. Imagine a bridge between a company and its customers that needs to...
Anti-Detect Browser
What Is an Anti-Detect Browser Anti-detect browser is a special class of browsers that not only “opens websites", but controls how you look for these...
API
What is an API? An API, or application programming interface, is an interface that allows applications to communicate with one another, with other programs, and with...
C
CAPTCHA
At first glance, this is just an annoying test: choose traffic lights, write distorted letters, prove that you are not a robot. But if you...
Cookies
What are HTTP Cookies Imagine that you went to a coffee shop, ordered a latte, and you were given a glass with a sticker: "Grisha,...
Cross-Site Scripting XSS
What Is XSS Cross-Site Scripting, or XSS, is one of the oldest and most insidious vulnerabilities on the web. Its essence is simple: an attacker...
D
Data Server
Data Server — What is It and Why Do You Need It? When you open an app, send an email, watch a TV series, or...
DNS Leak
To understand what a DNS leak is, imagine a postman. You ask him to deliver the letter, but instead of going to the address directly,...
Dynamic IP Address
Almost every one of us, unknowingly, comes across this term every day. When you wake up, open your laptop, connect to Wi-Fi or a cellular...
I
Internet Traffic
What Is Internet Traffic Internet traffic is not something ephemeral like a "signal" or a "wave". This is a very specific amount of data transferred...
IP address
An IP address (Internet Protocol address) is a distinct numerical identifier allocated to any device connected to a network, such as a computer, smartphone, or...
IP Ban
What Is an IP Ban An IP Ban is a deliberate blocking of access to a specific IP address. Simply put, the server "sees" your...
IP Blacklist
Imagine that an IP address is like an apartment number in a huge building called the Internet. When one of the residents is constantly making...
IP Quality Score
What Is IP Quality Score The IP Quality Score (IPQS) is a kind of "digital reputation" of your IP address. It shows how reliable and...
IPv4
What is IPv4? If you've ever gone online (and you've definitely done so), you've already encountered IPv4. Maybe not directly, maybe not consciously — but...
IPv6
What Is IPv6 and Why It Matters IPv6 is the next version of the Internet protocol, which replaces IPv4 and solves its main limitation: lack...
M
Man-in-the-Middle Attack
What is Man in the Middle Attack? Imagine a situation: you're chatting with a friend in a cafe, telling something personal, and suddenly - a...
Multi Factor Authentication MFA
What Is Multi Factor Authentication MFA Multifactor authentication, or MFA (Multi Factor Authentication), is a security system in which one password is no longer enough.Imagine...
Multi-Accounting
What Is Multi-accounting — And Why Is It Not Always Evil? Multi-accounting is a story about how one person or organization can have multiple accounts...
P
Pentest
What Is a Pentest A pentest (penetration test) is a simulated, controlled "attack" on your system with the sole purpose of finding vulnerabilities before intruders...
Ping
What Is Ping Ping is like an “echo" in the Internet world. Imagine that you are shouting into the mountains: if the answer came quickly,...
Proxy Checker
Imagine that you have a list of dozens or hundreds of proxy addresses. On paper, they look the same — IP and port, sometimes with...
Proxy Server
A proxy serves as a middleman between a client (e.g., your computer or browser) and a server (e.g., a website you want to visit). Imagine...
Public IP
What Is a Public IP Address A public IP address is the "street address" of your internet connection. Using it, external sites and services see...
R
Residential Proxies
Residential Proxies Definition Resident proxies (or residential proxies) are not just another "technical crutch" for the Internet. These are digital intermediaries that use real IP...
Router IP
Router IP - who's the boss of the neighbourhood? Imagine a city. There are thousands of houses, streets, turns, and intersections. To deliver a letter...
S
Spear Phishing
When they say “phishing”, many people imagine a naive user who clicks on an email “You won an iPhone!” and voluntarily gives away their card...
SQL Injection
What Is SQL Injection — In Simple Words Imagine that you visit a website and try to log in. Enter "admin" in the "login" field,...
SSL
What is SSL Definition? Let's imagine an ordinary conversation in a crowded cafe. You lean over to a friend, cover your mouth with your hand,...
Static IP Address
What Is The History Of An IP Address? To understand what a static IP is, let's start from the beginning: where did the IP address...
T
TLS
What is TLS - Without Complicated Words When you visit a website, especially if it involves payment, login or at least some kind of data...
Two-Factor Authentication (2FA)
What Is 2FA — And Why Is It Enough Not To Call It “Additional” Level The easiest way is to imagine 2FA, or two-factor authentication,...
W
Web Application Firewall (WAF)
What is Web Application Firewall (WAF) - In Simple Words Imagine that your website is the entrance to a building. People come in, fill out...
Website Address
You've definitely encountered this. You sit down at your computer, open your browser, type "youtube.com" in the address bar, and within a second, you're watching...
Wi-Fi
What is Wi-Fi? Wi-Fi is, in fact, magic. Well, or, if scientifically, a technology that allows you to transmit data over the air using radio...
WPAD (Web Proxy Auto Discovery Protocol)
What is WPAD? If the Internet is a highway through which millions of packets of information rush, then proxy servers are like checkpoints where data...