Thursday, December 25, 2014

Krish Infotech: Disable USB ports to prevent others from taking your data

With this trick, you can disable access to your USB(Universal Serial Bus) ports on your Windows based PC to prevent people from taking out data without permission or spreading viruses through the use of USB (pen and flash) drives. 

To use this trick to disable USB ports, follow the steps given below:-

1.Click on Start.
2.Click on Run. If you cannot find RUN, type it in the search box.
3.Type "regedit" without quotes. This will launch the Registry Editor.

4.Navigate to  HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\usbstor.
5.In the work area, double click on Start.
6.In the Value Data box, enter 4.
7.Click on OK.
8.Close Registry Editor and refresh your desktop.
9.To re-enable access to your USB ports, enter 3 in the Value Data box in Step 6.


Try it yourself to make your PC invulnerable from data theft and malware which spread through USB ports. This works on Windows XP, Windows Vista, Windows 7 and Windows 8.

Note: This trick also disables access to your USB connected peripheral devices. So, do not use it if you have USB connected keyboard and mouse.

courtesy: tweakandtrick.com

Tuesday, September 9, 2014

Easy ways to keep your computer safe on the Internet:

Introduction

Let's face it, the Internet is not a very safe place. There are hackers trying to access your computer, worms trying to infect you, malicious Trojans disguised as helpful programs, and spyware that reports your activities back to their makers. In many cases those who become infected unknowingly become a breeding ground for unwanted programs and criminal activity. It does not have to be this way. With proper education and smart computing the Internet can be a safe, useful, and fun place to visit without having to worry about what is lurking around the corner.

This tutorial was created to provide tips and techniques for smart and safe computing. When using these techniques you will not only protect yourself and your data from hackers and viruses, but also keep your computer running more smoothly and reliably. The advice in this tutorial applies to all computer users and all operating systems, but we have tried to point out specific steps for various operating systems as it becomes necessary.




What you need to know to keep your computer safe on the Internet


Tip 1: Always install Operating System updates

The most important steps for any computer user is to always install updates, especially security updates, when they become available for your operating system. When operating systems are developed, bugs, or programming errors, are unfortunately created that could cause security vulnerabilities or make your computer act unexpectedly. Though the developers spend many hours trying to prevent these bugs, they are ultimately human, and bugs occur. It does not matter what operating system we are talking about, bugs are always introduced. Due to this, companies will routinely release updates and patches to fix any security vulnerabilities or errors as they are discovered.

In order for your computer to operate smoothly and safely it is imperative that all users install updates, especially security updates, as they are released. By not installing these updates you leave your computer at risk from remote users hacking into them or viruses exploiting these bugs to gain access to your computer. Thankfully, all modern operating system provide easy methods for installing new updates. In fact, most of these methods do all the work for you and just require you to click a prompt to allow the updates to install. Therefore, there really is no reason not to install them.

Below are two tutorials that can be used to learn how to update your operating system in Windows and MacOS:

For Macs: How to install Software Updates on your Mac

For Windows: How to update Windows


Tip 2: Keep your installed applications up-to-date

A common method that computer infections use to infect your computer are security vulnerabilities in your installed programs. Common programs that are targeted due to their large install base are web browsers, Microsoft Office, Adobe Reader, Adobe Flash, Adobe Shockwave, and Oracle Java. In order to make your computer as secure as possible, you need to make sure these programs are updated when new security fixes are released. The problem is that many people just ignore alerts about new updates, even though these updates fix security problems that could allow hackers into your computer.

If you are prompted by a known application that you commonly use stating that there is a new update, just click the button to allow it to be updated. This is especially true for web browsers, which are commonly targeted by malicious code on web sites. If there is a new version of your web browser available, you should upgrade it so that any security vulnerabilities are fixed.

If you use Windows, there is a great program called Secunia PSI that automatically scans your computer for applications and automatically updates them for you. Information about this program can be found at this tutorial:

How to detect vulnerable and out-dated programs using Secunia Personal Software Inspector (PSI)


Tip 3: Do not use the same password at every site

It has now become common to hear about a company who was hacked and the hacker was able to access the company members email addresses and passwords. If you use the same password at every site, and one of those sites was hacked, the hacker now has your account information everywhere that you have an account. They can now login to your email, see what other accounts you have, banks that you use, etc and gather even more private information about you.

It is very important to use a different password at every site where you have an account. Unfortunately, we all know it's not realistic and even possible to remember a different password for every account you may own. To help with that you can use a password management program like Keepass to help you store your account information for each site you login to. Keepass also contains plugins that allow you to automatically login to sites you visit using the information stored in its database.

If you would rather not store your passwords in another program, then creating a standard password format is better than using the same password at each site. For example, for each site you visit you can create a password in the format <year born><sitename>!55. So if you were registering an account at Bleepingcomputer and you were born in 1975, you could use the password 1975bleepingcomputer!55. Then at CNN you could have an account 1975cnn!55. As you can see you are now using a different and strong password at each site, but you have an easy to remember format that you can use to determine the password.


Tip 4: Install and be sure to update your anti-virus software

It is very important that your computer has antivirus software running on your machine. By having an antivirus program running, files and emails will be scanned as you use them, download them, or open them. If a virus is found in one of the items you are about to use, the antivirus program will stop you from being able to run that program and infect yourself.

Is it also important to note that there is no point in running an antivirus program if you do not make sure it has all the latest updates available to it. If you do not update the software, it will not know about any new viruses, trojans, worms, etc that have been released into the wild since you installed the program. If a new infection appears in your computer, the outdated antivirus program will not know that it is bad, and not alert you when you run it and your computer becomes infected. It is imperative that you update your Antivirus software at least once a week (Even more if you wish) so that you are protected from all the latest threats.

It is also suggested that you install a free anti-malware scanner in addition to your normal anti-virus program. These free anti-malware scanners do not offer real-time protection unless you upgrade to the commercial version, but offer excellent detections when scanning with them periodically. Two recommended Windows anti-malware programs are MalwareBytes Anti-Malware and SUPERAntiSpyware. Tutorials on how to use these programs are listed below:



The following link has a list of some online and stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources

Tip 5: Use a firewall

The importance of using a Firewall on your computer or on your network cannot be stressed enough. Just because you have all the latest security updates, you are still susceptible to unreported, unpatched, or unknown vulnerabilities that a hacker may know about. Sometimes hackers discover new security holes in a software or operating system long before the software company does and many people get hacked before a security patch is released. By using a firewall the majority of these security holes will not be accessible as the firewall will block the attempt.

For a tutorial on Firewall's and a listing of some available ones, please visit the following link:  Understanding and Using Firewalls


Tip 6: Backup your data!

Backing up your data is not necessarily a way of keeping your computer safe, but it is a way of keeping your data safe. As you use your computer there may come a time that you cannot find a document or your hard drive fails. Having a regular backup of your data available saves you from the anguish of losing those hours of work or precious baby photos.

Both Windows and MacOS have free built in backup software so please be sure to use them to protect your data. In Windows, you can use Windows Backup program and Macs have the Time Machine program. If you wish to use a third-party program, we have listed two tutorials below that utilize free backup programs.

How to backup and restore your data using Cobian Backup
How to Backup and Restore your hard drive with DriveImage XML



Tip 7: Enable the display of file extensions

It is important to enable file extensions so you can see the complete file name. A file extension, or file name extension, is the letters immediately shown after the last period in a file name. Many viruses that are sent via email as attachments contain two periods. For example, picture.jpg.exe. Since Windows is by default configured to not display extensions, Windows will strip off the .exe and instead the file will appear as picture.jpg. To you this looks like harmless image file. Once you click on it, though, instead of an image opening, it actually runs the virus and you become infected. Though a Mac hides file extensions by default as well, this is less of a problem on that operating system.

For more information about file extensions and how to show them click here:

How to show File Extensions in Windows
How to show filename extensions on a Mac
What is a File Extension?



Tip 8: Do not open attachments from people you do not know

Don't open an attachment from someone you do not know. Simple as that. If someone you do not know sends you something, just delete it. If you receive an attachment from someone you know well, then you should still never open attachments that end with the following extensions: .exe, .pif, .com, or .bat. For more information about file extensions, please see step 3.

Attachments are a common way that computer infections spread from computer to computer. As described in the previous tip, malware writers exploit default settings on operating systems to make attachments harmless looking so that you will then open them.

If you really want to see the file, first scan it by saving it to a folder on your drive and then scanning it using a site like Virustotal. You can also email the person directly and ask if they actually sent you that file.


Tip 9: Ignore emails that state you won a contest or a stranger asking for assistance with their inheritance

A common online scam are emails from strangers that state that you won a contest or that they need help transferring money or receiving an inheritance. These are all scams where they are trying to get your personal information in order to perform identify theft or want to use you as part of a money laundering scheme. When you receive these emails just delete them.


Tip 10: Watch out for online and phone support scams

Phone support scams are becoming more common and involve receiving a phone call from someone pretending to be from Google, Microsoft, or another large company. They state that they have detected you are having computer problems and are offering free remote diagnostics to see what is wrong. After they take control of your computer and pretend to look at various things, they state that your computer has a lot of problems and then try to sell you a support contact or software. Microsoft, Google, and other large companies will NEVER call you out of the blue and do this. If you do receive a call like this say "No thanks" and hang up.

Just like phone support scams, online support scams are common as well. These scams come in the form of online advertisements that display misleading messages stating that your computer is having an issue. Just like the phone support scams, these are just advertisements from people who are trying to sell you software or services. Just ignore any advertisements and messages you see like this.


Tip 11: Ignore web pop ups that state your computer is infected or has a problem

When browsing the web, it is not uncommon to be shown an advertisement that pretends to be an online anti-virus program. These advertisements will pretend to scan your computer and then state you are infected. It will then prompt you to install a piece of software.

Examples of these types of advertisements can be seen below:


Fake Mac & Windows Online Scanners
Click on each image to enlarge

If you see these types of advertisements, just close your browser to close the message. If you are having issues closing your browser, then you can use the Alt+F4 keys in Windows or the Apple Key+Q in MacOS to force the program to close. If the browser refuses to close, then you can use these guides to help you close the programs:

How to force quit a program on a Mac
How to close a program in Windows



Tip 12: Ignore and close web pop ups that pretend to be a Windows alert

Another tactic some software vendors use is to display web pop ups that pretend to be an alert from your operating system. These alerts look just like a Windows or Mac window, but are instead a web popup trying to get you to click on the ad.

If you see these types of advertisements, just close your browser to close the message. If you are having issues closing your browser, then you can use the Alt+F4 keys in Windows or the Apple Key+Q in MacOS to force the program to close. If the browser refuses to close, then you can use these guides to help you close the programs:

How to force quit a program on a Mac
How to close a program in Windows



Tip 13: Some types of web sites are more dangerous than others

Some types of sites are more prone to distribute malware or use deceptive techniques to have you click on ads. With this said, do not visit porn sites! I know some of you may not be happy about this, but the reality is that many sites in this category happily try to infect machines who visit them.

Other sites that you can commonly become infected from are Warez and Crackz sites. Not only is pirated software illegal, but the sites that distribute them are a breeding ground for malware.


Tip 14: Be vigilant when using Peer-To-Peer Software

Using a program like Bittorrent for legitimate applications is perfectly fine. On the other hand, if you use P2P applications for copyrighted movies or software there is a good chance that they may contain Trojans as well. It is very common for malware developers to distribute malware on P2P networks that pretends to be a program required to view a movie or play a game. Therefore, it is strongly suggested that you do not use Peer-to-Peer software for illegal activities as you will probably get what you pay for.


Tip 15: When installing a piece of software, watch out for "bundled" tool bars and programs that you may not want

A common practice used by free programs is to bundle others programs with them. This allows the developer to offer a program for free, but still earn revenue by bundling tool bars and other software in them. When installing a program, please read through all the prompts and instructions carefully. If you come to a screen where the program is asking if you wish to install another companies tool bar or program, then please do some research as to whether or not you think these programs will be useful to you. If you do not wish to install these bundled programs, then uncheck the option to install them.

On a general note, having too many browser tool bars can negatively affect the functionality of your web browser. As most browsers have built-in search fields that you can customize, there is typically no need to install separate search tool bars unless they contain specific functionality that you would find useful.


Tip 16: When installing a piece of software, read the End User License Agreement (EULA) so you know what your getting into

When you install a piece of software be sure to read the end user license agreement, or EULA, before allowing it to install. By law, an EULA must contain information on how this program will interact with your computer and use your private information. If you find that a particular program is using your personal data or tracking your computer use, then you can use that information to determine if you really want to continue installing the software.

Source & Courtesy: bleepingcomputer.com

Thursday, August 7, 2014

Computer Interesting Facts!

  • The domain name www.youtube.com was registered on February 14, 2005.
  • If you opened up the case of the original Macintosh, you will find 47 signatures. One for each member of Apple’s Macintosh divison as of 1982.
  • Computer programming is currently one of the fastest growing occupations.
  • On an average work day, a typist’s fingers travel 12.6 miles.
  • TYPEWRITER is the longest word that can be made using the letters only on one row of the keyboard.
  • “Stewardesses” is the longest word that is typed with only the left hand.
  • The world’s first computer, called the Z1, was invented by Konrad Zuse in 1936. His next invention, the Z2 was finished in 1939 and was the first fully functioning electro-mechanical computer.
  • The first computer mouse was invented by Doug Engelbart in around 1964 and was made of wood.
  • Domain names are being registered at a rate of more than one million names every month.
  • There are approximately 1.06 billion instant messaging accounts worldwide.
  • The first banner advertising was used in 1994.
  • E-mail has been around longer than the World Wide Web.
  • The average computer user blinks 7 times a minute, less than half the normal rate of 20.
  • The average 21 year old has spent 5,000 hours playing video games, has exchanged 250,000 e-mails, instant and text messages and has spent 10,000 hours on the mobile phone
  • By the year 2012 there will be approximately 17 billion devices connected to the Internet.
  • While it took the radio 38 years, and the television a short 13 years, it took the World Wide Web only 4 years to reach 50 million users.
  • There are approximately 1,319,872,109 people on the Internet.
  • Bill Gates’ house was designed using a Macintosh computer.
  • Bill Gates, the founder of Microsoft was a college drop out.
  • The first domain name ever registered was Symbolics.com.
  • Another name for a Microsoft Windows tutorial is ‘Crash Course’!
  • Dell’s first advertisement was made on the back of a pizza box.
  • Yahoo! was originally called ‘Jerry’s Guide to the World Wide Web’.
  • Steve Jobs’ annual salary was $1, just enough to keep company health benefits.
  • The most productive day of the workweek is Tuesday.
  •  Bill Gates, the founder of Microsoft was a college drop out.
  • ❖ On one of the world's most popular shopping websites, eBay, there are transactions of approx. $680 per second.
  • ❖ There are approx. 6,000 new computer viruses released every month.
  • ❖ Of all the pictures available over the Internet, 80 percent of these pictures are of naked women.
  • ❖ 'Crash Course' is another name for Microsoft Windows tutorials.
  • ❖ The 'Email' is older than the World Wide Web.
  • ❖ There are about five porn pages for every 'normal' webpage.
  • ❖ Doug Engelbart, invented the first computer mouse in the year 1964, which was made of wood!
  • ❖ One of the world's leading computer and computer peripheral manufacturer, Hewlett Packard, was first started in a garage at Palo Alto, in the year 1939.
  • ❖ If you open up the case of the original Macintosh, you will find 47 signatures, which is of each member of Apple's Macintosh division of 1982.
  • ❖ Amongst the most interesting computer facts is, the first Apple computer which was built by Steve Jobs and Steve Wozniak, was made by using parts they got for free from their employers. They were made to scrounge spare parts from work.
  • ❖ If you want to get a computer aquarium, then you must get the Macquariums, which are aquariums made from old Macintosh computers.
  • ❖ It is believed that the first computer virus released in the world was a boot sector virus, which was created in the year 1986 by the Farooq Alvi brothers. It was designed by them to protect their research work.
  • ❖ The group of 12 engineers who designed the IBM PC were called 'The Dirty Dozen'.
  • ❖ The quintessential command 'Ctrl+Alt+Delete' was written by David Bradley.
  • ❖ Amazon is a printed book seller company, that now sells more eBooks than printed books.
  • ❖ Over 110 million users are registered on MySpace. If MySpace was a country, it would be tenth largest in the world, while Facebook would be third largest with over a billion users.
  • ❖ About 70% virus writers are actually employed by an organization under a contract.
  • ❖ HP, Google, Microsoft, and Apple have one thing in common. All of them were started in garages.
  • ❖ The Apollo 11 Lunar Lander which was used to travel to the moon, has less processing power than the processor of a cell phone.
  • ❖ Out of the 1.8 billion Internet users, only 450 million can speak English.
  • ❖ In 2011, one out of every eight married couples had met online.
  • ❖ The first 1GB hard disk, announced in 1980, weighed about 550 pounds, and was priced at $40,000.
  • ❖ On a Qwerty keypad, Alaska is the only state that can be typed using one row of keys.
  • Computer Facts For Kids
  • ❖ A normal human being blinks 20 times a minute, whereas, a computer user blinks only 7 times a minute!
  • ❖ The house of Bill Gates was designed using a Macintosh computer.
  • ❖ Sweden is a country with the highest percentage of Internet users (75%).
  • ❖ 'Mosaic' was the first popular web browser, released in the year 1993.
  • ❖ I am sure most of us must have played the game Tetris. Since the time it was created in the early eighties, it has sold more than 40 million copies worldwide, which made its creator richer by $8m.
  • ❖ Almost all computer users must know how destructive a virus can be. But then, it would be interesting to know that a virus cannot corrupt your PC on its own. It corrupts your system only when you activate it, by either downloading infected files from the Internet, or by sharing these infected files.
  • ❖ Computer circuitry can be destroyed by static electricity. It is so mild for humans that we don't even feel it.
  • ❖ The Nvidia GeForce 6800 Ultra chip has maximum numbers of transistors on it, approx. 222 million of them.
  • ❖ Konrad Zuse, has the credit of creating the world's first computer, known as the Z1, in 1936. Three years later, in the year 1939, the first fully-functioning electro-mechanical computer, known as Z2, was developed.
  • ❖ 'Stewardesses' is the longest word which can be typed with only the left hand.
  • ❖ Today, we find hard drives up to 1TB, but did you know, the first hard drive was created in 1979, and could hold just 5MB of data.
  • ❖ Interface Manager! That's what Windows was originally named.
  • ❖ If your work involves the extensive use of computers, then by the end of your average working day, your fingers would have traveled 12.6 miles.
  • ❖ If you find a way to hack Facebook, the company will pay you $500. Hackers, go for it.
  • ❖ The first microprocessor, Intel's 4004, was designed for the Busicom calculator.
  • ❖ Lenovo stands for 'new legend'. 'Le' for legend, and 'novo' stands for new.
  • ❖ Symbolics.com was the first ever domain name to be registered.
  • ❖ 80% of the emails sent daily are spammy.
  • ❖ SanDisk was earlier known as SunDisk.
  • ❖ Until September 1995, domain registration was free.
  • ❖ 'Electronic brains'! That's what computers were called in the 1950s.
  • ❖ One can type 20 times faster using a Dvorak keyboard as compared to using a Qwerty keyboard.
  • ❖ COBOL language was developed by the first female admiral in the US Navy, Admiral Grace Hopper.
  • ❖ 'ShenMue' is the most expensive game ever to be made. It was developed for Sega Dreamcast, and was priced at $20 million.

Monday, June 9, 2014

ESSENTIALS FOR WEB SITE DEVELOPMENT:


MARKUP AND STYLING:

CSS: Cascading Style Sheets — CSS is a stylesheet language used to define how a web page written HTML or XHTML should be presented and displayed in a web browser.
DHTML: Dynamic HyperText Markup Language — DHTML is the term used when HTML, JavaScript and CSS are used to create animated or interactive web sites.
HTML: HyperText Markup Language — HTML is a tag-based markup language used to create web pages. Every site on the internet uses HTML in some form.
WML: Wireless Markup Language — WML is an XML-based markup language for content accessed through a wireless mobile device. Similar to HTML.
XHTML: Extensible HyperText Markup Language — XHTML is a special type of HTML that conforms to the strict rules of XML. This allows for cleaner code and code that can be understood by a wider array of software.
XML: Extensible Markup Language — XML is a general purpose markup language for describing data in a structured manner.

BUSINESS LOGIC PROGRAMMING:

ASP (Microsoft): Active Server Pages — ASP is a server-side scripting language used to add business logic and database interactivity to dynamic websites.
CGI: Common Gateway Interface — CGI is a protocol that allows server applications to interact with client web browsers.
JSP: JavaServer Pages — JSP is a server-side scripting language used to add business logic and database interactivity to dynamic websites.
PHP: PHP Hypertext Preprocessor/Personal Home Page — PHP is a server-side scripting language used to add business logic and database interactivity to dynamic websites.
RoR: Ruby on Rails — RoR is a web application framework based on the Ruby scripting language. It has been used by several popular Web 2.0 web sites.
SSI: Server Side Includes — SSI is a server-side scripting language used primarily to include the contents of one file in another.

WEB SERVICES:

ASP: Application Service Provider — An ASP is any business that provides online, Internet-delivered applications to customers.
AWS: Amazon Web Services — AWS are a collection of remote application services offered by Amazon.com.
RSS: Really Simple Syndication — RSS is an XML specification for publishing frequently updated web content to subscribers. RSS is the secret sauce behind blogging.
S3: Amazon Simple Storage Service — Amazon S3 is a storage solution that offers unlimited data stored for a small fee through a simple web service interface.
YUI: Yahoo! User Interface — The YUI library is an open-source JavaScript library for building rich interactive web applications.

DATABASES:

CRUD: Create, Read, Update and Delete — CRUD are the four basic functions of any persistent storage system, most commonly a database system.
DBMS: Database Management System — A DB is a structured collection of data organized to allow for easy retrieval by computer programs using SQL.
SQL: Structured Query Language — SQL is a special programming language used to retrieve data from and modify relational database systems.

SERVERS AND HOSTING:

CRON: Command Run ON — CRON is a scheduling program on most Unix system. It is used to schedule time-sensitive activities for software programs to perform.
IIS: Internet Information Services — IIS is a set of internet-based services for servers running Microsoft Windows.
VPS: Virtual Private Server — A VPS is a partition of a physical server that has the ability to run a separate operating system and reboot itself independently of other VPSs on the same physical server.

PROTOCOLS:

FTP: File Transfer Protocol — FTP is a commonly used protocol for transferring files from one computer to another over a network.
HTTP: HyperText Transfer Protocol — HTTP is a communications protocol used for transferring data available on the Web.
HTTPS: Secure HypterText Transfer Protocol — HTTPS is a variation of HTTP used to specify that the data being transferred is/should be encrypted and secure.
SSH: Secure Shell — SSH is a network protocol that allows data to be exchanged over a secure channel between two computers.
SSL: Secure Sockets Layer — SSL is a cryptographic protocol used for encrypting sensitive data while being sent through the Internet.
WAP: Wireless Application Protocol — WAP is an international standard for accessing Internet content on a wireless mobile device.

STANDARDS AND ACCESSIBILITY:

508: Section 508 — Section 508 is an amendment to the Rehabilitation act of 1973 that requires federal agencies to make their electronic and information technology accessible to people with disabilities. It is commonly used as a standard for accessible web sites.
W3C: World Wide Web Consortium — The W3C is the international standards organization for the Web.
WAI: Web Accessibility Initiative — The WAI is an initiative enacted by the W3C for improving the accessibility of web pages for people using software other than web browsers (e.g. screen readers).
WCAG: Web Content Accessibility Guidelines — WCAG is a series of web accessibility guidelines published by the WAI.

CLIENT-SIDE SCRIPTING:

AJAX: Asynchronous JavaScript And XML — AJAX is a web programming technique that uses JavaScript to transparently interact with a web server, eliminating the need to reload a web page to see changes.
DOM: Document Object Model — DOM is a standard object model for representing HTML and XML formats as objects.
JS/ECMAScript: JavaScript — JavaScript is a scripting language used for client-side (web browser) web development.

DEVELOPMENT:

CRAP: Contrast, Repetition, Alignment, Proximity — CRAP is a design methodology applied to the design and layout of web pages.
CVS: Concurrent Versions System — CVS is a version control system that allows several developers to collaboratively work on a single set of code.
GUI: Graphical User Interface — A GUI is a computer interface that allows users to interact with the computer through graphical icons and windows, typically with the aid of a mouse.
SVN: Subversion — SVN is a version control system that allows several developers to collaboratively work on a single set of code.
WYSIWYG: What You See Is What You Get — WYSIWYG is used to describe web development applications in which the authoring environment closely resembles the final output of the program.

GRAPHICS AND IMAGES:

CMYK: Cyan Magenta Yellow Key — RGB is a subtractive color model used by computers to display various colors by subtracting different levels of cyan, magenta, and yellow.
FLA: Flash Authoring File — FLA files are the primary authoring output files of Adobe Flash
GIF: Graphics Interchange Format — GIF is a popular graphics format most commonly used for graphics in web sites.
JPEG: Joint Photographic Experts Group — JPEG is an image compression codec commonly used to encode pictures for the Web.
PNG: Portable Network Graphics — PNG is an image format that was developed to replace the aging GIF image format for web sites.
PSD: PhotoShop Document — PSD files are the primary authoring output files of Adobe Photoshop.
RGB: Red Green Blue — RGB is an additive color model used by computers to display various colors by combining different levels of red, green, or blue.
SVG: Scalable Vector Graphics — SVG is an XML markup language used to describe two dimensional vector graphics.
SWF: Small Web Format/ShockWave Flash — SWF is a proprietary vector graphics format used to create animations on web sites.

E-COMMERCE:

AVS: Address Verification System — AVS is a method of verifying the identity of a person using a credit card to make a purchase online.
CSC/CVV: Card Security Code/Card Verification Value — CSC is a security feature available on most major credit cards that is used to prevent credit card fraud.
MID: Merchant ID — A MID is a unique identifier assigned to companies selling goods and used for billing purposes.
FAQ: Frequently Asked Questions — FAQ lists are a common support mechanism on many web sites that provides answers to questions that are commonly asked of the company.

SEARCH ENGINE OPTIMIZATION:

CPC: Cost Per Click — CPC is the amount an advertiser pays every time a user clicks on one of their advertisements in a PPC campaign.
CPM: Cost Per 1000 Impressions — CPM is the amount an advertiser pays for every 1000 (or, roman numeral “M”) users who view their advertisement on a web page.
CTR: Click Through Rate/Ratio — CTR is a measure of the amount of users who click an advertisement as compared to the number of users who see the advertisement.
PPC: Pay Per Click — PPC is an advertising model used on the Web in which advertisers only pay when a user actually click their advertisement.
PR: PageRank — PageRank is an algorithm used to measure the value of a particular document relative to other documents in the same set. Commonly used by search engines to rank web site popularity.
SEO: Search Engine Optimization — SEO is the process of tweaking web sites so that they are more likely to be indexed higher in search engine results.
SERP: Search Engine Results Page — SERP is the listing of web pages returned by a search engine in response to a user search

SECURITY:

XSS: Cross-Site Scripting — XSS is a common web page security vulnerability where an attacker rigs a site they do not own to run malicious code.
CSRF: Cross-Site Request Forgery — CSRF is a common web page security vulnerability where an attacker poses as an authenticated user to execute actions.

ADDRESSING:

CNAME: Canonical Name — A CNAME is an alias of one hostname to another.
DNS: Domain Name System — DNS servers as the phone book of the Internet. It translates human-readable hostnames such as solosignal.com into numeric IP addresses used by networking equipment.
DTD: Document Type Definition — DTD is a document used to describe and specify the structure and organization of an XML document.
ICANN: Internet Corporation for Assigned Names and Numbers — ICANN is a non-profit organization formed to oversee the management of domain names and IP addresses.
IP: Internet Protocol — IP is a protocol for transferring data across a packet-switched network.
SLD: Second-Level Domain — SLD is a domain directly below the TLD. For example. In “solosignal.com”, “solosignal” is the SLD and “.com” is the TLD.
TLD: Top-Level Domain — TLD is the last part of any Internet domain name. For example: .com, .net, and .org are all TLDs.
URL: Uniform Resource Locator — URLs are the addresses used to request files through the Web.
WWW: World Wide Web — The WWW is the network of interlinked hypertext documents available through the Internet.

Courtesy: solosignal.com