Hosting Lexicon

All the terms that are really important when it comes to hosting & WordPress

A

Autoresponder

An autoresponder is an automated system for responding to emails or other digital messages. It is used to send immediate responses to incoming messages without the need for manual intervention. Typically, an autoresponder is set up to inform users that a message has been received and to inform them of the processing time or alternative contact options.

AVV

A data processing agreement (DPA) is a legal contract between the data controller (e.g. a company) and a processor (e.g. a service provider or hosting provider). This contract regulates the conditions under which the processor may process personal data on behalf of the controller. Typical components of a DPA include regulations on data security, processing purpose limitation, cooperation with other processors as well as the obligation to provide information and the controller's ability to monitor data processing. The DPA is an important instrument for compliance with data protection regulations, in particular the GDPR in the European Union.

You can create an AVV with just a few clicks in your Dashboard create.

B

Bruteforce

Bruteforce is a method of cracking passwords or encryptions by systematically trying out all possible combinations until the correct one is found. This method can be made more difficult by security mechanisms such as captchas or login locks.

Browser

A browser is a software application that is used to display and interact with content on the World Wide Web (www). Well-known browsers are Google Chrome, Mozilla Firefox, Safari and Microsoft Edge.

Blacklist

A blacklist is a list of IP addresses, domain names or email addresses that are classified as unsafe or harmful. Systems use blacklists to block or restrict access to these addresses.

Backup

A backup is a copy of data that is stored in a separate location so that the original data can be restored in the event of data loss, damage or an error. Backups are essential for data security and are created regularly to protect important information.

WPspace provides you with backups of the last 14 days at any time, which you can easily use with just a few clicks.

C

CGI

The Common Gateway Interface (CGI) is a standard for communication between web servers and external programs or scripts that are executed on the server. CGI enables web servers to generate and process dynamic content based on requests from users via the World Wide Web. Typical applications of CGI are form processing, database queries and the generation of dynamic website content.

Cloud hosting

Cloud hosting refers to the provision of hosting services via a network of connected servers that provide virtual resources. These services enable scalability, flexibility and reliability through the use of multiple servers. They are accessible via the internet and offer cost-efficient solutions through on-demand resource utilization and automated security and recovery functions.

Client

A client is a program that accesses the resources of a central server. To make this possible, the client must establish a connection to the server and can then use its services. Communication between client and server takes place via a network. The term "client" is also used to describe a single computer within a network that uses the services or resources of other systems.

Catch-A-Address

A catch-all address (also known as a wildcard address) is an email address that is configured to receive all emails sent to any unspecified or misspelled address within a domain. Instead of rejecting emails to non-existent or misspelled addresses, a catch-all address forwards all emails to the main address or a specified address within the domain. This can be useful to ensure that no important messages are lost if someone enters an email address incorrectly or uses a new address that is not yet known.

Captcha

A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a security measure used to ensure that a certain action, such as submitting a form or creating an account, is performed by a human and not by an automated program. CAPTCHAs usually ask the user to solve a simple task that is easy for humans but difficult for computers to automate, such as recognizing distorted letters and numbers or solving a picture puzzle. This helps to prevent spam and abuse and increase the security of online interactions.

Cronjob

A cronjob is a time-controlled task that is automatically executed on a server at set times or intervals. This can include, for example, the automatic backup of data or the regular sending of emails.

Content Management System (CMS)

A CMS is software that enables users to create, edit and manage content on a website without the need for in-depth technical knowledge. One of the best-known CMS systems is WordPress, for example.

Content Delivery Network (CDN)

A CDN is a network of servers that deliver content such as images, videos and other files to users based on their geographic location to improve website load times and reduce server load.

CNAME

A CNAME is a type of DNS record that points an alias name to a real (canonical) domain. It is often used to point multiple domains to a single IP address or domain.

D

DDNS

DDNS stands for Dynamic Domain Name System. It is a system that makes it possible to link dynamic IP addresses of computers or networks with a fixed domain name. DDNS is particularly useful for devices or networks whose IP addresses change regularly, e.g. for connections via DHCP (Dynamic Host Configuration Protocol).

Users or organizations use DDNS services to access their devices or networks without having to worry about changing their IP addresses. The DDNS service automatically updates the IP address associated with a specific domain name when the IP address of the device changes. This keeps access to services or devices over the Internet consistent and reliable.

DKIM

DKIM (DomainKeys Identified Mail) is a process for securing emails using digital signatures. These signatures enable recipients to check the authenticity of the email and the integrity of its content by verifying the authenticity of the sender.

DENIC

DENIC (Deutsches Network Information Center) is the central registry for domains under the top-level domain .de, which is the country code for Germany. As a cooperative enterprise, DENIC manages the registration and administration of .de domains and at the same time supports the stability and security of the German Internet space.

DDOS

DDoS stands for Distributed Denial of Service. It is a type of cyber attack in which an attacker attempts to paralyze a service, website or network resource by overloading it with a large number of requests. The attack is carried out from many distributed locations (hence "distributed") in order to overload the capacity of the target server and make it inaccessible to legitimate users (denial of service).

DDoS attacks can be carried out through various methods such as sending a large amount of traffic from compromised computers (botnets) or through exploits in network protocols. Organizations use special security solutions and network technologies to defend against DDoS attacks in order to protect their systems and maintain the availability of their services.

GDPR

The GDPR (General Data Protection Regulation) is a European Union regulation that ensures the protection of personal data and the privacy of EU citizens. It regulates the processing of personal data by private companies and public bodies.

Domain Name System (DNS)

DNS is a system for the translation of domain names (such as www.beispiel.com) in IP addresses (such as 192.0.2.1), which are used by computers to communicate on the Internet. Their main task is to resolve names into the corresponding IP address. The information required for this is stored on so-called name servers.

Domain

A domain is a unique name that identifies a resource on the Internet, e.g. a website. It usually consists of a name and a top-level domain (TLD), such as .com, .de, or .org.

E

F

FTP

FTP stands for File Transfer Protocol. It is a network protocol that enables the exchange of files between computers via a TCP/IP network such as the Internet. FTP is used to upload or download files and provides basic functions for managing files on the server, such as creating, deleting or moving files and directories. It usually requires authentication with a username and password, but also supports anonymous connections.

Firewall

A firewall is a security-oriented software system that protects IT systems from unauthorized access, such as hacker attacks.

G

Greylisting

Greylisting is a method of combating spam in which incoming emails are initially temporarily rejected. The sender's server has to resend the message after a short waiting period. As many spam bots are not designed for this delay and do not retry delivery, this filters out a large proportion of unwanted emails. Emails from legitimate servers are accepted on the second delivery attempt.

H

HTTPS

HTTPS is an HTTP connection encrypted with SSL/TLS.

HTTP

The Hypertext Transfer Protocol (HTTP) is a network protocol for data transfer. It is primarily used to load websites and other content from the World Wide Web (WWW) into web browsers.

HSTS

HSTS stands for HTTP Strict Transport Security. It is a security mechanism used by web servers to instruct browsers to only access a website via HTTPS. This protects against certain types of network attacks, especially man-in-the-middle attacks, where attackers could try to intercept or manipulate traffic.

If HSTS is activated, the server sends a special HTTP header (Strict-Transport-Security) to the browser. This header contains instructions that the browser should only allow encrypted connections to the website for a certain period of time (specified in seconds). This prevents the browser from ever establishing an unencrypted HTTP connection to the website, even if the user enters a corresponding link or URL.

HTML

HTML (Hypertext Markup Language) is a text-based markup language that is primarily used to create websites with static content.

htaccess

The .htaccess-file is a configuration file that is used on Apache web servers. It enables website operators to make server-side settings without having direct access to the server's main configuration file. With .htaccess can be used to set up redirects, introduce directory protection with a password, define user-defined error pages and specify URL rewrites (rewrite rules). This file is placed in a specific directory and the rules it contains then apply to this directory and all subdirectories below it.

Hostname

The host name is the name of a computer in a network.

Hack

A hack is an unauthorized manipulation or access to a computer system or network. The goal of a hack can be to steal data, compromise systems, disrupt networks or exploit security vulnerabilities. Hacks can be carried out by individuals, groups or organizations and range from simple attacks to complex and sophisticated operations.

I

IP

IP stands for Internet Protocol. It is a basic network protocol that forms the basis for data transmission in computer networks, including the Internet. IP allows data packets to be exchanged between devices on the network by assigning them a unique address known as an IP address. This address is used to identify devices on the network and allow them to communicate with each other by sending and receiving data packets over the network.

IMAP

IMAP enables access to received emails and their management, whereby the emails usually remain on the email server. In contrast to the Post Office Protocol (POP), where emails are retrieved from the server and stored locally, IMAP allows users to manage and synchronize their emails from different locations.

ICANN

ICANN, the Internet Corporation for Assigned Names and Numbers, is a non-profit organization responsible for the administration and coordination of the Domain Name System (DNS). This includes the assignment of domain names and IP addresses as well as the administration of the Internet's root servers. ICANN ensures that the Internet is stable and secure and that domain names are unique and consistent worldwide.

J

K

L

Let's Encrypt

Let's Encrypt is a non-profit certification authority that issues free SSL/TLS certificates. These certificates enable website operators to implement a secure HTTPS connection for their websites. Let's Encrypt aims to promote encryption on the web and improve the security of internet communications by providing simple and free certificates that can be renewed automatically. Let's Encrypt certificates are widely used and supported by many web hosting providers and large companies.

M

MySQL

MySQL is a widely used relational database management system (RDBMS) known for its speed, reliability and ease of use. It is widely used for web applications and supports comprehensive database features, including table, query and transaction management. MySQL is an open source software developed by MySQL AB and later acquired by Oracle Corporation. It is supported by a large community and is one of the most popular database solutions worldwide.

MariaDB

MariaDB is a powerful relational database management system that was developed as an open source alternative to MySQL. It offers comprehensive functions for databases and is often used for web applications and content management systems.

Managed Server

A managed server is a hosting service where the provider takes over the administration and maintenance of the server. In contrast to an unmanaged server, where the customer is responsible for the administration, maintenance and security of the server, with a managed server the provider takes care of these tasks. This typically includes installing updates, monitoring server performance, security patches and troubleshooting. Managed servers offer companies and website operators the advantage of being able to concentrate on their core business while using a server infrastructure that is managed and protected by experts.

Malware

Malware is an abbreviation for "malicious software" and refers to any type of software designed to damage, disrupt, infiltrate or manipulate computers or data without the user's consent. Malware can take various forms, including viruses, worms, Trojans, spyware, ransomware and other malicious programs. The intent behind malware can range from stealing personal data to sabotaging systems. Protection against malware requires up-to-date security software, regular updates and conscious behavior when dealing with files and emails from unknown sources.

N

Nameserver

A name server (DNS server) is an essential element of the Domain Name System. It translates domain names into IP addresses so that devices on the Internet can be accessed using names.

O

P

Pagespeed

PageSpeed refers to the speed and optimization of a website for faster loading time and better user experience. This includes techniques such as image optimization, caching, minimizing HTTP requests and server-side optimizations to improve performance.

As a WPspace customer, you have the option of having one of our WordPress experts perform a free pagespeed optimization.

If you are interested in your current pagespeed result, you can request a free pagespeed test at the following link: WordPress Speedtest - Test the loading time of your website! (wp-space.de)

Provider change

A change of provider refers to the process by which a user or company switches from one Internet service provider to another. This can happen for various reasons, such as better services, cheaper prices or improved network coverage. During a provider change, existing contracts can be terminated and new connections set up to ensure a seamless transition from one provider to the next.

As a customer or ineteressent of WPspace you benefit from our free migration service for WordPress websites and email inboxes. You can find more information here: Start now for free: WordPress Hosting from WPspace (wp-space.de)

Provider

A provider is a company that offers services or resources. In the field of internet services, this often refers to a provider of internet access and related services such as web hosting and email.

POP3

POP3 stands for Post Office Protocol Version 3 and is a protocol used to download emails from an email server to a local computer or device. POP3 allows users to retrieve their emails from a server and store them locally, usually deleting the messages from the server once they have been downloaded. Unlike IMAP (Internet Message Access Protocol), POP3 is designed less for synchronizing and sharing emails across multiple devices and more for downloading and storing emails on a single device.

PHP

PHP is an open source scripting language that is primarily used for the development of dynamic websites.

Phishing

Phishing is a form of online fraud in which fraudsters attempt to obtain personal information such as usernames, passwords and credit card numbers by posing as trustworthy sources. This is often done through fake emails, websites or messages designed to trick users into revealing their sensitive information. The fraudulent practices of phishing aim to deceive victims and cause financial loss or identity theft. Protective measures such as being vigilant when opening emails, checking URLs and using security software are crucial to protect yourself from phishing attacks.

Q

R

Roundcube

Roundcube is an open source webmail application that allows users to manage and retrieve their emails via a web browser. It provides a user-friendly interface for accessing email accounts and supports functions such as reading, writing and managing emails as well as managing contacts and calendars.

Reseller

Resellers are resellers of web space and/or domains and act as an independent provider.

Registrar Lock

A registrar lock, also known as a domain lock or domain transfer lock, is a security function offered by domain registries. When a registrar lock is set on a domain, it prevents unauthorized domain transfers to another registrar. This lock is normally used to increase the security of the domain and to ensure that only authorized persons or organizations can make changes to the domain settings. Before a domain transfer can take place, the registrar lock must usually be lifted by the domain holder or an authorized point of contact.

S

Subdomain

A subdomain is a part of a larger domain in a domain name system (DNS). It makes it possible to organize websites and other resources under a separate address within the main domain. For example, "blog.example.com" is a subdomain of "example.com". Subdomains are often used to identify and manage different areas of a website or specific services (such as "mail.example.com" for email) without having to register separate domain names. They allow for more flexible structuring and management of Internet resources under a single main domain name.

SPF

SPF (Sender Policy Framework) is a DNS-based procedure for checking the sender address of emails. It helps to prevent email spoofing by determining which servers are authorized to send emails on behalf of a domain.

Spam

Spam refers to unwanted or unsolicited messages that are usually distributed in large numbers via email, messaging services or social media. These messages often contain advertising, fraudulent content or links to malicious websites. Spam can also take the form of unwanted comments on blogs or forums. The purpose of spam is often to promote commercial products or collect personal data from users. Measures such as spam filters and security settings help to reduce spam messages and improve the online experience of users.

SSL

SSL (Secure Sockets Layer) is a security protocol that establishes an encrypted connection between a web server and a browser. It secures the transmission of sensitive data such as passwords and credit card information over the Internet.

T

Traffic

"Traffic" refers to the amount of data transferred between a web server and the visitors to a website, as well as the number of visitors to a website.

TLD

TLD stands for "Top-Level Domain". This is the highest component of a domain name in the Domain Name System (DNS) of the Internet. The TLD is located to the right of the last dot in the domain name and can include generic TLDs (gTLDs) such as ".com", ".net", ".org" or country-specific TLDs (ccTLDs) such as ".de", ".fr". TLDs are used to classify and organize domain names according to categories or geographical regions.

TLS

TLS (Transport Layer Security) is a security protocol that enables an encrypted connection between a web server and a browser in order to guarantee the security and integrity of the transmitted data.

U

URL

A URL (Uniform Resource Locator) is the address used to identify and locate resources on the Internet. It typically consists of several parts: the protocol (e.g. "http://" or "https://"), the domain name (e.g. "example.com") and optionally a path that identifies specific resources on the server (e.g. "/page1.html"). URLs are used to uniquely identify and retrieve websites, images, files and other content on the Internet.

V

VPN

A VPN (Virtual Private Network) is a secure and encrypted tunnel that allows users to access resources over the Internet as if they were directly connected to a private network. VPNs are used to protect the privacy and security of user data by encrypting the connection and masking the user's IP address. They are often used to establish secure connections to public Wi-Fi networks, bypass geo-restrictions and anonymize online activity.

W

Whitelist

A whitelist is a list of items that are classified as trusted or allowed. In the context of computer systems and networks, a whitelist typically refers to a list of email addresses, IP addresses, applications or websites that are authorized to receive certain permissions or access, while all others can be blocked by default. Whitelists are used to prevent unwanted or harmful content or access while ensuring access to known safe or authorized resources.

Web server

A web server is software that processes requests to domains and provides the results via the HTTP protocol. Our web server software is the Apache HTTP Server. The term "web server" is sometimes also used to describe the computer on which this software is running.

X

Y

Z

Hosting ABC
Information: Our support is not occupied due to the holiday on 01.11.2024!