Skip to main content

20 INTERNET TERMS U SHOULD KNOW: DNS, HTML, FTP, URL, HTTPS, PORT, BIT & MANY MORE.



20 INTERNET TERMS U SHOULD KNOW: DNS,  HTML, FTP, URL, HTTPS, PORT, BIT & MANY MORE.

 

Internet terms

1.  URL

what is Url


Full form of URL is Uniform Resource Locators.

URLs—are the web browser addresses of internet pages and files. With a URL, you can locate and bookmark specific pages and files in a web browser. 

You can also download the offline page of the internet pages and share that page with social media.

The format of a URL can be written in these forms:

1.http://www.examplewebsite.com/mypage


2.https://www.examplewebsite.com/mypage

 

3.www.examplewebsite.com/mypage

 

4.https://examplewebsite.com/mypage

 

5.http://examplewebsite.com/mypage

 

This format is frequently shortened to this:

www.examplewebsite.com/mypage 

Sometimes URLs are longer and more complicated, but all follow acknowledged rules for naming. URLs consist of three parts:

  • Protocol: The protocol is the portion before the symbol //:. Most web pages use the protocol http or https, but there are other protocols too.
  • Host: The host or top-level domain, which frequently ends in .com, .net, .edu, or .org but can also end in one of many others that have been officially recognized.
  • Filename: The filename or page name is the portion between protocol and host name.

 

2. HTTP

what is HTTP

 

HTTP is the short form for Hypertext Transfer Protocol, the data communication standard of web pages. When a web page has this prefix, the links, text, and pictures should work correctly in a web browser.

It is initially developed by Tim Berners-Lee at CERN in 1989 and introduced in 1991; 29 years ago.

Different versions of HTTP present today are:

                                  

Year

HTTP Version

1991

0.9

1996

1.0

1997

1.1

2015

2.0

2018

3.0

 

3.  HTTPS

what is HTTPS


HTTPS is the short form for Hypertext Transfer Protocol Secure. This indicates that the web page has added an additional layer of encryption to hide your personal information and passwords from hackers.

HTTPS creates a secure channel over an insecure network.

Whenever you log in to your online bank account or a shopping site there mostly https presents in website.

When you use a e-commerce website and enter credit card information into, look for https in the URL for security.

The protocol is also called as HTTP over TLS, or HTTP over SSL.


Usage in websites

As of April 2018, 33.2% of Alexa top 1,000,000 websites use HTTPS as default, 57.1% of the Internet's 137,971 most popular websites have a secure implementation of HTTPS, and 70% of page loads (measured by Firefox Telemetry) use HTTPS.

 

 

4. HTML

What is HTML


Hypertext Markup Language is full form of (HTML).

HTML is the programming language of web pages. HTML commands a web browser to display text and graphics in a unique and specific way.

HTML elements are the building blocks of HTML pages. With HTML elements you can constructs graphs, add images and other objects such as interactive forms into the rendered page.

HTML provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. 

The first publicly available description of HTML was a document called "HTML Tags", first mentioned on the Internet by Tim Berners-Lee in late 1991.

The initial version of HTML describes 18 elements which make relatively simple design of HTML.

HTML versions timeline

HTML 2

November 24, 1995

HTML 2.0 was published as RFC 1866. Supplemental RFCs added capabilities:

·         November 25, 1995: RFC 1867 (form-based file upload)

·         May 1996: RFC 1942 (tables)

·         August 1996: RFC 1980 (client-side image maps)

·         January 1997: RFC 2070 (internationalization)

HTML 3

January 14, 1997

HTML 3.2 was published as a W3C Recommendation. It was the first version developed and standardized exclusively by the W3C, as the IETF had closed its HTML Working Group on September 12, 1996.

HTML 4

December 18, 1997

HTML 4.0 was published as a W3C Recommendation. It offers three variations:

·         Strict, in which deprecated elements are forbidden

·         Transitional, in which deprecated elements are allowed

·         Frameset, in which mostly only frame related elements are allowed.

 

April 24, 1998

HTML 4.0 was reissued with minor edits without incrementing the version number.

 

December 24, 1999

HTML 4.01 was published as a W3C Recommendation. It offers the same three variations as HTML 4.0 and its last errata were published on May 12, 2001.

 

HTML 5

 

October 28, 2014

HTML5 was published as a W3C Recommendation.

 

            November1,2016

HTML 5.1 was published as a W3C Recommendation.

 

December14,2017

HTML 5.2 was published as a W3C Recommendation.

 

 

 

 

5.XML

 

what is XML

XML is extensible Markup Language, related  to HTML.

XML focuses on cataloging and databasing the text content of a web page.

XHTML is a combination of HTML and XML.

For many office-productivity tools, including Microsoft Office (Office Open XML), OpenOffice.org and LibreOffice (Open Document), and Apple's iWork  XML-based formats have become the default.

XML has also provided the base language for communication protocols such as XMPP. Applications for the Microsoft .

NET Framework built configuration and property lists on XML files.

The characters making up an XML document are divided into markup and content.

However, in a CDATA section, the delimiters <![CDATA[ and ]]> are classified as markup, and  the text between them is classified as content. In addition, whitespace before and after the outermost element is classified as markup.

XML documents may begin with an XML declaration that describes some information about themselves. An example is <?xml version="1.0" encoding="UTF-8"?>.


6.   IP Address

what is IP address


Every electronic device that connects to the internet uses an Internet Protocol address for identification and tracking purpose.

In most cases, IP addresses are assigned automatically.

An IP address can look something like this:

202.3.104.55

Or, like this:

21DA:D3:0:2F3B:2AA:FF:FE28:9C5A

It may be a permanently assigned IP address, or the IP address may change occasionally, but it is always a unique identifier.

Wherever you browse or send an email or instant message, and whenever you download a file, your IP address serves as the equivalent of an automobile license plate to enforce accountability and traceability.

 7.   ISP ( Internet Service providers)


what is ISP


You need an internet service provider (ISP) to use the internet.

You may access a free ISP at school or at college, or at work, or you may pay for a private ISP at home.

An ISP is the company or government organization that provide you the internet services instead of paying monthly fee.

An ISP offers a variety of services for a variety of prices: web page access, email, web page hosting, and so on.

Most ISPs provide various internet connection speeds for a different monthly fee i.e. for cheaper plan your internet services may be for few days or internet speed will be low contrary for premium plans number of days of plan and internet speed will be high . 

You may choose to pay more for a higher-speed internet connection if you like to stream movies or select a less expensive package if you use the internet mostly for light browsing and email.

In 1989, the first Internet service providers, companies offering the public direct access to the Internet for a monthly fee, were established in Australia and the United States.

In Brookline, Massachusetts, The World became the first commercial ISP in the US. Its first customer was served in November 1989.

ISP Classified into the following categories:

·         Hosting ISPs

·         Transit ISPs

·         Virtual ISPs

·         Free ISPs

·         Wireless ISPs

 

8.   File Transfer Protocol

what is FTP


The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. 

FTP is built on a client-server model architecture using separate control and data connections between the client and the server.

Data transfer modes

Data transfer can be done in any of three modes:

·         Stream mode (MODE S): Data is sent as a continuous stream, relieving FTP from doing any processing. Rather, all processing is left up to TCP. No End-of-file indicator is needed, unless the data is divided into records.

·         Block mode (MODE B): Initially it designed for transferring record-oriented files (STRU R), although can also be used to transfer stream-oriented (STRU F) text files. FTP puts each record (or line) of data into several blocks (block header, byte count, and data field) and then passes it on to TCP.

·         Compressed mode (MODE C): Extends MODE B with data compression using run-length encoding.

Most contemporary FTP clients and servers do not implement MODE B or MODE C.

 

File structure

File organization is specified using the STRU command. The following file structures are defined in section 3.1.1 of RFC959:

·         F or FILE structure (stream-oriented). Files are viewed as an arbitrary sequence of bytes, characters or words. This is the usual file structure on Unix systems and other systems such as CP/M, MSDOS and Microsoft Windows. (Section 3.1.1.1)

·         R or RECORD structure (record-oriented). Files are viewed as divided into records, which may be fixed or variable length. This file organization is common on mainframe and midrange systems, such as MVS, VM/CMS, OS/400 and VMS, which support record-oriented filesystems.

·         P or PAGE structure (page-oriented). Files are divided into pages, which may either contain data or metadata; each page may also have a header giving various attributes. This file structure was specifically designed for TENEX systems, and is generally not supported on other platforms. RFC1123 section 4.1.2.3 recommends that this structure not be implemented.

Most contemporary FTP clients and servers only support STRU F. STRU R is still in use in mainframe and minicomputer file transfer applications.

 

 9.   Router

 

what is Router

A router or router-modem combination is the hardware device that acts as the mediator and coordinator for network signals arriving at your home or business from your ISP.

A router can be wired or wireless or both.

A router provides a defense against hackers and directs content to the specific computer, device, streaming device, or printer that should receive it.

A router may have interfaces for different types of physical layer connections, such as copper cables, fiber optic, or wireless transmission. 

Routers may provide connectivity within enterprises, between enterprises and the Internet, or between internet service providers' (ISPs') networks.

The largest routers (such as the Cisco CRS-1 or Juniper PTX) interconnect the various ISPs, or may be used in large enterprise networks. 

Smaller routers usually provide connectivity for typical home and office networks.

Installation

 

Wired and wireless both networks have variety in their connection setup or installation process.

On wired networks, connections are simple than wireless ones.

Your computer just needs to connect to the modem or router through a cable. Some network settings may be needed to identify the networks and that’s it. On the other hand, wireless networks you have to setup connection on connections settings.

Compatibility

 

Wired connections are suitable for almost all the devices having Ethernet or Home PNA compatibility.

An actual Ethernet port is required for establishing a wired network connection.

Ethernet is the most used wired connection for computers and Some computer doesn’t have that port then additional Ethernet adapter cards are used.

Wireless networks don’t require any sort of ports to get connected. Devices that are wireless compatible with the signals from the router can get connected with it.

But multiple users at a time can cause the reduce in data transferring speed of wireless connections.

Security

 

Wired connections are visible to only those devices that are connected with the computer directly.

But wireless connections are most of the time visible to every nearby wireless compatibility Device.

As it is being broadcast in the public areas, wireless networks are riskier than wired networks. Though signal encryption provides some kind of security to wireless connections, but wired networks are definitely less vulnerable than wireless.

It is easily clear that wired connections are more safe than wireless due to easy installation, wider compatibility and less security threat .

 

 

10. Bit

 

what is Bit

The bit is a basic and smallest unit of information in computing and digital communications. The name is a portmanteau of binary digit.

The bit is not defined in the International System of Units (SI). 

The bit represents a logical state with one of two possible values. These values are most commonly represented as either 0 or 1, but other representations such as true/false, yes/no, +/−, or on/off are also very common.

bitwise operation optionally processes bits one at a time. Data transfer rates are usually measured in decimal SI multiples of the unit bit per second (bit/s), such as kbit/s.

one bit is the information entropy of a binary random variable that is 0 or 1 with equal probability.

11. Email

what is email


Full form of Email is electronic mail. It is the process of sending and receiving of typewritten messages from sender to receiver required both using mail services.. 

Email is usually handled by a webmail service—Gmail or Yahoo Mail, for example—or an installed software package such as Microsoft Outlook or Apple Mail.

You can send email to yourself or send mail via different mail services also i.e. from outlook to gmail.

Web-based email

Many email providers have a web-based email client (e.g. AOL Mail Gmail Outlook.com and Yahoo! Mail etc).

This allows users to log into the email account by using any compatible web browser to send and receive their email. Mail is typically not downloaded to the web client, so can't be read without a current Internet connection.

 

 

12. E-Commerce

what is e-commerce


E-commerce full form is electronic commerce—the transactions of buying and selling online.

Every day, billions of dollars exchange hands through the internet and the World Wide Web.

Some common applications related to electronic commerce are:

·         B2B e-commerce (business-to-business)

·         B2C e-commerce (business-to-consumer)

·         Conversational commerce: e-commerce via chat

·         Digital Wallet

·         Document automation in supply chain and logistics

·         Electronic tickets

·         Enterprise content management

·         Group buying

·         Instant messaging

·         Internet security

·         Online auction

·         Online banking

·         Online office suites

·         Online shopping and order tracking

·         Online transaction processing

·         Pre-tail

·         Print on demand

·         Shopping cart software

·         Social networking

·         Teleconference

·         Usenet newsgroup

·         Virtual assistant

·         Domestic and international payment systems

Aside from traditional e-commerce, the terms m-Commerce (mobile commerce) and  t-Commerce (online trade via smart, digital tv) have also been used.

 

M-commerce

M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.

 

As a form of e-commerce, m-commerce enables users to access online shopping platforms without needing to use a desktop computer.

 

Examples of m-commerce include in-app purchasing, mobile banking, virtual marketplace apps like the Amazon mobile app or a digital wallet such as Apple Pay, Android Pay, google pay, Mi-pay,Paytm,paypal, UPI payments and Samsung Pay etc.  

 

Over time, content delivery over wireless devices has become significantly faster, more secure and scalable and still increasing day by day.

 

As of 2017 the use of m-commerce accounted for 34.5% of e-commerce sales.

 

 

T-Commerce

 

T-Commerce is a term describing trade via a (smartdigital TV-set In which recharge of tv via tv, choosing packages and a marketing channel enabling interactive advertising and addressable advertising.

 

It is part of Electronic Business and e-Commerce which themselves are the most prominent parts of u-Commerce.

 

The promise of T-commerce is to enhance shopping channels as well as regular TV ads by offering consumers a "One-Click" "Buy It" possibility.

 

 

U-Commerce

 

Ubiquitous Commerce also known as U-Commerce refers to a variety of goods and/or services.

Sometimes, it is used to refer to the wireless, continuous communication and exchange of data and information between and among retailers, customers, and systems (e.g., applications) regardless of location, devices used, or time of day.

 

The origin and development of Ubiquitous Commerce is based on various information and communication technologies. These technologies were driving forces for the evolution to business transactions at any time and in any place and so they will be in the future.

Among them are the following examples:

·         Internet as the fundamental technology and source

·         mobile data services regarding M-Commerce which are especially Wireless LAN, UMTS, HSDPA and in the future 4G / WiMAX

·         TV technologies/add-ons like Teletext and increasingly IPTV

·         technologies enhancing the communication of devices (EDI, XML, Web service).

 

S-Commerce (Silent-Commerce )

Silent Commerce is an expression for the execution of business transactions b/w electronic devices.

It happens without assistance and in some cases even without awareness of the human owners of those devices.

 

13. Encryption

 

what is encryption

The process of converting information or data into a code, especially to prevent unauthorized access is called as encryption.

The simple information or data is known as Plaintext and the encrypted data or information is known as ciphertext. Only authorized parties can decipher or decrypt a ciphertext back to plaintext and access the original information. 

It is possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, computational resources, skills and experience are required.

Modern encryption techniques ensure security because modern computers are inefficient at cracking the encryption.

 Modern encryption schemes utilize the concepts of public-key and symmetric-key.

Public-Key

In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages.

However, only the receiving party has access to the decryption key that enables messages to be read.

Symmetric key

 

It also known as private key. In symmetric-key schemes, the encryption and decryption keys are the same.

Communicating parties must have the same key in order to achieve secure communication.

 

 

 14. Firewall

what is firewall


Firewall is a term to describe a barrier against destruction. In the case of computing, a firewall consists of software or hardware that protects a computer from hackers and viruses.

Firewalls are categorized as a network-based or a host-based system.

Network-based firewalls can be positioned anywhere within a LAN or WAN. Host-based firewalls are deployed directly on the host itself to control network traffic or other computing resources.

They are either a software appliance running on general-purpose hardware or a hardware appliance running on special-purpose hardware, or a virtual appliance running on a virtual host controlled by a hypervisor.

Firewall appliances may also offer non firewall functionality, such as DHCP (Dynamic host configuration protocol) or VPN (Virtual private network)  services.

Packet filter

The first reported type of network firewall is called a packet filter, which inspect packets transferred between computers.

Three basic actions regarding the packet consist of a silent discard, discard with Internet Control Message Protocol or TCP reset response to the sender, and forward to the next hop.

Connection tracking Stateful Firewall

In computing, a stateful firewall is a network-based firewall that individually tracks sessions of network connections traversing it. 

Stateful packet inspection, also referred to as dynamic packet filtering, is a security feature often used in non-commercial and business networks.

 

Application/ Layer 7

The key benefit of application layer filtering is that it can understand certain applications and protocols such as File Transfer Protocol (FTP), Domain Name System (DNS), or Hypertext Transfer Protocol (HTTP).

This allows it to identify unwanted applications or services using a non-standard port or detect if an allowed protocol is being abused or not validated.

 

Endpoint specific

Endpoint based application firewalls function by determining whether a process should accept any given connection.

 

 

 

 

15. Malware

what is malware


 

Malware is any software intentionally designed to cause damage to a computerserver, client, or computer network. Malware is a broad term that describes any malicious software designed by hackers.  

A wide variety of malware types exist, including computer viruseswormsTrojan horses, ransomware , spywareadwarerogue software, and scareware., and other software that seeks to do one of four things:

  • Vandalize your computer in some way.
  • Steal your private information.
  • Take remote control of your computer for other ends.
  • Manipulate you into purchasing something.

 

Grayware

Grayware is a term applied to unwanted applications or files that are not classified as malware, but can worsen the performance of computers and may cause security risks.

It describes applications that behave in an annoying or undesirable manner, and yet are less serious or troublesome than malware. 

 

Rootkits

Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user.

Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.

 

Backdoors

A backdoor is a method of bypassing normal authentication procedures, usually over a connection to a network such as the Internet.

Once a system has been compromised, one or more backdoors may be installed in order to allow access in the future, invisibly to the user.

 

 

16. Phishing

what is Phishing


The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers is called phishing.

Typically carried out by email spoofing, instant messaging, and text messaging, phishing often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site.

Types

Spear phishing

Phishing attempts directed at specific individuals or companies is known as spear phishing.

In contrast to bulk phishing, spear phishing attackers often gather and use personal information about their target to increase their probability of success.

 

Whaling

The term whaling refers to spear phishing attacks directed specifically at senior executives level and other high-profile targets.

 

Catphishing and catfishing

Catphishing  is a type of online deception that involves getting to know someone closely in order to gain access to information or resources about the persons. usually in the control of the mark, or to otherwise get control over the conduct of the target.

 

Catfishing is a similar but distinct concept, involves a person creating a social network profile on different platforms as a sock puppet or fictional person in order to finagle someone into a (usually) romantic relationship.

This usually begins online, with the hope or promise of it progressing to real-life romance. This is never the objective of the perpetrator; in general, he is seeking access to the mark's money or resources, or to receive gifts or other consideration from the victim.

 

Clone phishing

Clone phishing is a type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email.

The attachment or link within the email is replaced with a malicious version and then sent from an email address spoofed to appear to come from the original sender.

It may claim to be a resend of the original or an updated version to the original.

Typically this requires either the sender or recipient to have been previously hacked for the malicious third party to obtain the legitimate email.

 

Vishing (Voice phishing)

Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. 

Once the phone number (owned by the phisher, and provided by a voice over IP service) was dialed, prompts told users to enter their account numbers and PIN. 

Vishing (voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

 

SMS phishing

SMS phishing or smishing  uses cell phone text messages to deliver the bait to induce people to divulge their personal information. 

Smishing attacks typically invite the user to click a link, call a phone number, or contact an email address provided by the attacker via SMS message.

The victim is then invited to provide their private data; often, credentials to other websites or services.

 

 

 

17. DNS (Domain Name System)

 

what is DNS

DNS full form is Domain Name System.

 

DNS is an Internet service that translates domain names to IP addresses.

 

 

Domain Name System (DNS)

 

The Domain Name System (DNS) is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network.

 

Domain names are alphabetic and therefore easy to remember, but the Internet is based on numeric IP addresses, so a DNS server is required for computers to communicate with one another.

 

DNS name server

A DNS name server is a server that stores the DNS records for a domain; a DNS name server responds with answers to queries against its database.

 

DNS database

The most common types of records stored in the DNS database are for Start of Authority (SOA), IP addresses (A and AAAA), SMTP mail exchangers (MX), name servers (NS), pointers for reverse DNS lookups (PTR), and domain name aliases (CNAME).

DNS has been expanded over time to store records for other types of data for either automatic lookups, such as DNSSEC records, or for human queries such as responsible person (RP) records.

As a general purpose database, the DNS has also been used in combating unsolicited email (spam) by storing a real-time blackhole list (RBL).

The DNS database is traditionally stored in a structured text file, the zone file, but other database systems are common.

 

Domain name space

The domain name space consists of a tree data structure. Each node or leaf in the tree has a label and zero or more resource records (RR), which hold information associated with the domain name. 

 

DNS zone 

DNS zone may consist of only one domain, or may consist of many domains and sub-domains, depending on the administrative choices of the zone manager.

 

DNS resolvers

The client side of the DNS is called a DNS resolver.

A resolver is responsible for initiating and sequencing the queries that ultimately lead to a full resolution (translation) of the resource sought, e.g., translation of a domain name into an IP address.

DNS resolvers are classified by a variety of query methods, such as recursive, non-recursive, and iterative. 

 

DNS Message Format

The DNS protocol uses two types of DNS messages, queries and replies; both have the same format.

Each message consists of a header and four sections: question, answer, authority, and an additional space. A header field (flags) controls the content of these four sections.

The header section consists of the following fields: Identification, Flags, Number of questions, Number of answers, Number of authority resource records (RRs), and Number of additional RRs. Each field is 16 bits long,

 

 

 

 

 

18. WWW (world Wide Web)

 

what is WWW

The World Wide Web (WWW), commonly known as the Web, is an information system where documents and other web resources are identified by Uniform Resource Locators (URLs, such as https://example.com/), which may be interlinked by hypertext, and are accessible over the Internet.

Origin

English scientist Tim Berners-Lee invented the World Wide Web in 1989. He wrote the first web browser in 1990 while employed at CERN near Geneva, Switzerland.

Static page

A static web page (sometimes called a flat page/stationary page) is a web page that is delivered to the user exactly as stored.

 

Dynamic web page 

A server-side dynamic web page is a web page whose construction is controlled by an application server processing server-side scripts.

 

 

19. PORT

 

what is port

In computer networking, a port is a communication endpoint.

 

At the software level, within an operating system, a port is a logical construct that identifies a specific process or a type of network service.

 

Port Numbers

 

Ports are identified for each transport protocol and address combination by 16-bit unsigned numbers, known as the port number.

 

A port number is a 16-bit unsigned integer, thus ranging from 0 to 65535. For TCP, port number 0 is reserved and cannot be used, while for UDP, the source port is optional and a value of zero means no port. 

 

A port number is always associated with an IP address of a host and the type of transport protocol used for communication.

 

The lowest-numbered 1024 port numbers identify the historically most commonly used services and are called the well-known port numbers. Higher-numbered ports are available for general use by applications and are known as ephemeral ports.

 

The port numbers are divided into three ranges: the well-known ports, the registered ports, and the dynamic or private ports.

 

The well-known ports (also known as system ports) are those from 0 through 1023. 

 

Port Scanning

 

The practice of attempting to connect to a range of ports in sequence on a single computer is commonly known as port scanning

 

Port Use in URL

 

Port numbers are sometimes seen in web or other uniform resource locators (URLs).

 

By default, HTTP uses port 80 and HTTPS uses port 443, but a URL like http://www.example.com:8080/path/ specifies that the web browser connects instead to port 8080 of the HTTP server.

 

20. SSL Certificate

 

 

what is SSL

SSL stands for Secure Socket Layer.

 

SSL certificates validate your website's identity, and encrypt the information visitors send to, or receive from, your site. This keeps thieves away from spying on exchanges between you and your shoppers.

 

TLS/SSL client certificate

Client certificates are less common than server certificates, and are used to authenticate the client connecting to a TLS service, for instance to provide access control.

Client certificates are supported by many web browsers, but most services use passwords and cookies to authenticate users, instead of client certificates.

Client certificates are more common in RPC (Remote Procedure Call) systems, where they are used to authenticate devices to ensure that only authorized devices can make certain RPC calls.

 

 

TLS/SSL server certificate

 

Server certificates typically are issued to hostnames, which could be a machine name (such as ‘XYZ-SERVER-01’) or domain name (such as ‘www.digicert.com’).

 

A web browser reaching the server, and validates that an SSL server certificate is authentic. That tells the user that their interaction with the web site has no eavesdroppers and that the web site is exactly who it claims to be. 

 

SSL certificates can be classified into three types:

·         Domain Validation SSL

·         Organization Validation SSL

·         Extended Validation SSL.

 

Domain Validation (DV) SSL certificate

A Domain Validation (DV) SSL certificate is the most basic of the three types of SSL certificates. While Organization Validated (OV) and Extended Validated (EV) require multiple validation steps, DV SSL certificates require a single validation step.

DV SSL certificates are very beneficial for those who want to quickly get a certificate on their site to build trust and ensure their visitors are protected.

It is used for personal website.

 

Organization Validation SSL certificate

Organization Validation SSL certificate is a high assurance SSL certificate which is used to validated a company/business/organization.

The main purpose of OV SSL certificate is to encrypt website/business and user’s sensitive information which is being used for transactions.

It comes up with 2048-bit signature and powerful 256-bit encryption.

 

Extended Validation SSL Certificate

An Extended Validation SSL Certificate (also known as EV SSL for short) is the highest form of SSL Certificate on the market. It is used for E-commerce website.

All levels of SSL – provide encryption and data integrity, they vary in terms of how much identity verification layers is involved.

Comments

Popular posts from this blog

15 EMAIL ACCOUNTS GUIDE:DEFINITION, PROVIDERS, TYPES, COMPARISON, BEST-ONE & FULL DETAILS.

PARLIAMENT OF INDIA:STRUCTURE, PURPOSE, MEMBERS, FACTS, SEATS, ELIGIBILITY & FULL DETAILS.

PC Credit: Livemint.com

NDA & NA 2020: DATES, APPLY, ELIGIBILITY, VACANCY, SELECTION PROCESS, SALARY& FULL INFORMATION

NDA & NA 2020:ADMIT CARD, RESULT, INTERVIEW, MEDICAL, TRAINING, MERIT-LIST & FULL DETAILS.

DELHI METRO (DMRC): LENGTH, ROUTE & FARE, LINES, RANK, MAP, SPEED, FUTURE EXPANSION & FULL DETAILS.

Delhi Metro  PC CREDIT: Wikipedia

INDIAN HONOUR SYSTEM: MEDALS, TYPES, ORDERS, RECIPIENT LIST, PHOTOS & FULL DETAILS.

INDIAN HONOUR SYSTEM: MEDALS, TYPES, ORDERS, ELIGIBILITY, SELECTION, PHOTOS & FULL DETAILS.

Insurance types in the United States| All you need to know

  Insurance types in the United States | All you need to know  

COMPUTER GUIDE: DEFINITION, TYPES, SPECIFICATIONS, EXAMPLES, COMPONENTS & FULL DETAILS.

COMPUTER GUIDE: DEFINITION, TYPES, SPECIFICATIONS, EXAMPLES, COMPONENTS & FULL DETAILS.  

INDIAN MISSILE: NAME-LIST, HISTORY, TYPES, RANGE, FUTURE-PROJECTS, CLASSIFICATION & FULL DETAILS.

INDIAN MISSILE: NAME-LIST, HISTORY, TYPES, RANGE, FUTURE-PROJECTS, CLASSIFICATION & FULL DETAILS.