a
- affiliate
- affiliate program
- algorithm
- Animated GIF
- anonymizer
- anti-malware
- aspect ratio
b
- back up
- backup
- bandwidth
- bare metal
- BCC
- Blind Carbon Copy
- binary
- BIOS
- Basic Input/Output System
- bit
- bit-ness
- blog
- web log
- bot
- botnet
- bounce
- breach
- brick
- broadband
- brute force attack
- BSOD
- Blue Screen of Death
- buffer
- bug
- bus
- byte
c
- Completely Automated Public Turing test to tell Computers and Humans Apart
- CDN
- Content Delivery Network
- certificate
- click bait
- clipboard
- clone
- cloud
- codec
- CSV
- Comma Separated Values
- compression
- context menu
- cookie
- core
- CPU
- Central Processing Unit
- CPU bit-ness
- craplet
- crapplet
- crapware
- CRC
- Cyclic Redundancy Check
- XSS
- cross-site scripting
- Cruft
d
- dark web
- dashboard
- DDOS
- Distributed Denial Of Service attack
- deep web
- defrag
- defragment
- device driver
- DHCP
- Dynamic Host Configuration Protocol
- dialog box
- differential backup
- digital signature
- disc
- DLL
- Dynamic Link Library
- Domain Name System
- DNS
- dongle
- download
- Dots Per Inch
- DPI
- driver
- DRM
- Digital Rights Management
- Digital Subscriber Line
- DSL
e
- echo chamber
- ellipsis
- encryption
- encryption – asymmetric
- encryption key
- encryption – public key
- encryption – symmetric
- epub
- electronic publication
- ESP
- Email Service Provider
- ethernet
- executable
f
- Fallacy of Composition
- file system
- Fiber Optic Service
- FiOS
- firewall
- Focus
- foistware
- form factor
- FTP
- File Transfer Protocol
- FUD
- Fear Uncertainty Doubt
- full backup
g
- GIF
- Graphics Interchange Format
- Graphical User Interface
- GUI
- guid
- Globally Unique IDentifier
h
- hack
- hacker
- ham
- hamburger
- hamburger menu
- hash
- HDD
- Hard Disk Drive
- HDMI
- High-Definition Multimedia Interface
- home page
- honeypot
- HTML
- HyperText Mark-up Language
- http
- HyperText Transfer Protocol
- https
- HyperText Transfer Protocol – Secure
- hub
i
- idle
- image backup
- Internet Message Access Procotol
- IMAP
- incremental backup
- IOT
- Internet Of Things
- Input/Output
- I/O
- Internet Protocol Address
- IP address
- ISO image
- ISO
- Internet Service Provider
- ISP
j
- Java
- javascript
k
- keylogger
- kilobyte
l
- LAN
- Local Area Network
- latency
- Linux
m
- mainboard
- malware
- malicious software
- man in the middle
- map
- Master Boot Record
- MBR
- megabyte
- memory
- mobo
- motherboard
- modem
- Modulator Demodulator
- motherboard
- Mount
- MTBF
- multi-factor authentication
n
- Network Attached Storage
- Network Address Translation
- NAT
- nonbreaking space
- nbsp
- net etiquette
- Netiquette
- netizen
- network
- network adapter
- Network Interface Controller
- NIC
- notification area
- nybble
o
- OCR
- TLD
- op-level domain
- open wifi
p
- packet
- partition
- passphrase
- patch
- Portable Document Format
- Problem Exists Between Chair And Keyboard
- PEBCAK
- Phishing
- pixel
- POP
- Point Of Presence
- pop-up menu
- POP3
- Post Office Protocol version 3
- populate
- port
- Port 25
- POTS
- Plain Old Telephone System
- protocol
- proxy
- pst
- Personal STore
- Potentially Unwanted Program
- PUP
- pwn
q
- Quick Response
- QR Code
r
- RAID
- redundant array of independent disks
- rainbow table
- RAM
- Random Access Memory
- ransomware
- RDP
- reboot
- recovery drive
- registrar
- registry
- root
- rootkit
- router
s
- sandbox
- SATA
- Serial ATA
- scareware
- screen shot
- script
- sector
- Secure Boot
- SED
- Self-Encrypting Drive
- SFTP
- Secure File Transfer Protocol
- Share
- shell
- shovelware
- Short Message Service
- SMS
- SMTP
- Simple Mail Transfer Protocol
- sniffing
- SSD
- Solid State Disks
- spam
- spoof
- spyware
- SSD
- Solid State Disk
- Secure SHell
- SSH
- Service Set IDentifier
- SSID
- SSL
- Secure Sockets Layer
- streaming
- switch
- system tray
t
- telemetry
- Tethering
- TOR
- The Onion Router
- third party ad
- Time-based One Time Password
- TOTP
- TLA
- Three-Letter Acronym
- top-level domain
- TLD
- Too long; didn.t read
- TL;DR
- TLS
- Transport Layer Security
- tooltip
- tray
- trojan
- TPM
- Trusted Platform Module
- Two-factor authentication
u
- UAC
- User Account Control
- UEFI
- Unified Extensible Firmware Interface
- UI
- URL
- USB
v
- VGA
- virtual desktop
- virtual machine
- Virtual Memory
- virus
- VLC
- vlog
- video blog
- vlogger
- VNC
- Voice Over Internet Protocol
- VOIP
- volume (disk)
- Virtual Private Network
- VPN
- VPS
- Volume Snapshot Service
- VSS
- vulnerability
w
- WAN
- Wide Area Network
- weblog
- Wi-Fi
- wifi
- wireless network
- wireless network adapter
- What You See Is What You Get
- WYSIWYG
x
- XSS
y
- Your Mileage May Vary
- YMMV
z
- zero-day
- zombie