A
- Abandonware
- Abnormal data
- Abstraction
- Abstract data type (ADT)
- Abstract method
- AC
- Account harvesting
- Account hijacking
- Accumulator
- Action
- Active learning
- Actuator
- AdaBoost
- Adaptive design
- ADC
- Address bar
- Address bar spoofing
- Address bus
- Address Resolution Protocol (ARP)
- Add-in
- Advanced Encryption Standard (AES)
- Advanced Persistent Threat (APT)
- Advanced Research Projects Agency Network (ARPANET)
- Adversarial examples
- Adversarial training
- Adware
- Ad blocker
- Ad fraud
- Ad rotator
- Affective computing
- Agent architecture
- Agent-based model (ABM)
- Aggregate function
- Agile software development
- Air gap
- Algorithm
- Algorithmic efficiency
- Algorithm design
- AlphaFold
- ALU
- Always-On
- Amazon Redshift
- Amazon Web Services (AWS)
- American Standard Code for Information Interchange (ASCII)
- Analog
- Android
- Android
- Android app
- AND Logic Gate
- AND Logic Gate
- Annoybot
- Annoyware
- Anomaly detection
- Anonymization
- Anonymizer
- Anonymous
- Antivirus
- Anti-ransomware
- Anti-virus (AV) killer
- Apache Hadoop
- Apache Hive
- Apache Pig
- Apache Spark
- Applet
- Application
- Application Programming Interface (API)
- Application security
- Application software
- Arithmetic and Logic Unit
- ARQ
- Array
- Array data structure
- Artifact
- Artificial Intelligence (AI)
- ASCII
- Assembly language
- Assertion
- Assignment
- Association rule learning
- Associative array
- Astroturfing
- Asymmetric cryptography
- Asymmetric encryption
- Asynchronous data transmission
- Attack vector
- Attention mechanism
- Attribute
- Attribution
- Augmented reality (AR)
- Authentication
- Autoencoders
- Automata theory
- Automated reasoning
- Automatic Repeat ReQuests
- Autonomous system
- Autoregressive Integrated Moving Average (ARIMA)
- Autoregressive Integrated Moving Average (ARIMA)
- Auto-regressive models
B
- Backdoor
- Back-translation
- Bad sector
- Bagging
- Bait advertising
- Ban
- Bandwidth
- Bandwidth throttling
- Banking trojan
- Barcode
- Bayesian networks
- Bayesian optimization
- Bayesian programming
- Behavior
- Behavioral biometrics
- Benchmark
- BERT
- BERTology
- Best, worst and average case
- Bias and Variance
- Bidirectional LSTM
- Big data
- Big data analytics
- Big O notation
- Big-game hunting (BGH)
- Binary
- Binary number
- Binary search algorithm
- Binary tree
- Biohacking
- Bioinformatics
- Biometrics
- BIOS
- Bit
- Bitcoin
- Bit rate (R)
- Blacklist
- Black friday
- Blended threat
- BLEU score
- Bloatware
- Block cipher
- Bluejacking
- Bluesnarfing
- Bluetooth
- Blue Screen of Death (BSoD)
- Blu-Ray
- BMP file format
- Boolean algebra
- Boolean data type
- Boolean expression
- Boot
- Booting
- Bootkit
- Boot sector
- Boot sector virus
- Bot
- Botnet
- Bot herder
- Boundary data
- Breadcrumbs
- Bricking
- Bring Your Own Device (BYOD)
- Browlock
- Browser Helper Object (BHO)
- Brute force attack
- Buffer
- Buffer overflow
- Bug bounty
- Bundler
- Bundleware
- Burn
- Bus
- Business continuity management (BCM)
- Business email compromise (BEC)
- Business process compromise (BPC)
- Byte
C
- Cache
- Callback
- CapsNet
- Cardinality (SQL)
- Cascading Stylesheets (CSS)
- CatBoost
- Categorical data
- CD
- Central Processing Unit (CPU)
- Central Tendency
- Character
- Character-based language models
- Checksum
- Check Digit
- Chi-squared test
- Chrome browser
- Cipher
- Ciphertext
- CIR
- Class
- Class-based programming
- Cleanroom software engineering
- Clickbait
- Clickjacking
- Clickstream analysis
- Click fraud
- Client
- Client-server network
- Closure
- Cloud computing
- Cloud hosting
- Cloud Jupyter
- Cloud native
- Cloud notebook
- Cloud phishing
- Cloud security
- Clustering
- Cobalt strike
- CodeBERT
- Code library
- Coding
- Coding theory
- Cognitive science
- Cohort analysis
- Cold boot
- Collaborative filtering
- Collection
- Collinearity in regression analysis
- Columnstore indexes in SQL
- Column based database
- Command line interface
- Command & control (C&C)
- Comma separated values
- Comma-separated values (CSV)
- Compact disc
- Companion virus
- Compiler
- Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
- Complex data
- Composite key
- Compression
- Compromised
- Computability theory
- Computation
- Computational biology
- Computational chemistry
- Computational complexity theory
- Computational model
- Computational neuroscience
- Computational physics
- Computational science
- Computational steering
- Computer
- Computer architecture
- Computer data storage
- Computer ethics
- Computer graphics
- Computer network
- Computer program
- Computer programming
- Computer science
- Computer science (CS)
- Computer scientist
- Computer security
- Computer vision
- Computer-Aided Design (CAD)
- Computing
- Concatenation
- Concept keyboard
- Concurrency
- Conditional
- Confidence interval
- Confusion matrix
- Consistency check
- Constant
- Consumer fraud protection
- Container
- Content-Based Filtering
- Context Vectors
- Contingency Table
- Continuation-passing style (CPS)
- Continuous applications
- Continuous data
- Continuous intelligence
- Control bus
- Control flow
- Control system
- Convolutional Neural Networks (CNN)
- Cookie
- Cookies
- Copyright
- Coreference resolution
- Correlation analysis
- Correlation database
- Cosine similarity
- CPU
- Crack
- Cracking
- Creative Commons (CC)
- Credential stuffing
- Crimeware
- Cron
- Cross-site scripting (XSS)
- Cross-Validation
- Crypter
- Cryptocurrency
- Cryptocurrency mining
- Cryptography
- Cryptojacking
- CSV
- Current instruction register
- Customer data hub
- Customer Relationship Management (CRM)
- CVE identifier
- Cyberbullying
- Cybercrime
- Cybersecurity
- Cyberspace
- Cyber espionage
- Cyber liability insurance
- Cyber Monday
- CycleGAN
D
- Daemon
- DALL-E
- DALL-E 2
- Dashboard
- Dask
- Database
- Database index
- Database management system
- Database partitioning
- Database sharding
- Database transaction
- Dataframes
- Dataiku
- Data aggregation
- Data analysis platform
- Data breach
- Data bus
- Data center
- Data center proxy
- Data corruption
- Data encryption
- Data exfiltration
- Data fabric
- Data field
- Data fusion
- Data governance
- Data imputation
- Data integration
- Data lake
- Data Loss Prevention (DLP)
- Data mapping
- Data matching
- Data mesh
- Data mining
- Data munging
- Data normalization
- Data partitioning
- Data pipelines
- Data preprocessing
- Data Privacy Day (DPD)
- Data processed
- Data product
- Data protection
- Data protection act
- Data science
- Data science ethics
- Data scraping
- Data standardization
- Data structure
- Data transformation
- Data type
- Data visualization
- Data warehouse
- Data wrangling
- DBMS
- DDoS attack
- Debugging
- Decimal
- Declaration
- Decryptor
- Dedicated server
- Deepfake
- Deep learning
- Definition
- Defragmentation
- Denary
- Denoising autoencoders
- Dependency parsing
- Descriptive statistics
- Destruction Of Service (DeOS)
- Device control
- Device driver
- Dialer
- Dialogue interface
- Dictionary attack
- Differential privacy
- Digital camera
- Digital certificate
- Digital data
- Digital footprint
- Digital Signal Processing (DSP)
- Digital versatile disc
- Dimensionality reduction
- Discrete data
- Discrete Event Simulation (DES)
- Disk storage
- Distributed computing
- Distributed Denial of Service (DDoS)
- Divide and conquer algorithm
- DNA sequence
- DNS
- DNS filtering
- DNS over HTTPS (DoH)
- DNS over TLS (DoT)
- Docker
- Documentation
- Document Object Model (DOM)
- Domain
- Domain administrator privileges
- Domain Name System Security Extensions (DNSSEC)
- Domain Name System (DNS)
- DOS attack
- Double entry
- Double-precision floating-point format
- Download
- Downloader
- Dox
- DPA
- DRAM
- Drive-by download
- Drive-by mining
- Dropper
- Drop-down box
- DVD
- DVD-RAM
- Dwell time
E
- Echo check
- Edge analytics
- Edge browser
- Edge device
- Electronic sports (eSports)
- ELMo
- ELT
- Embedded analytics
- Encryption
- Endpoint Detection and Response (EDR)
- Endpoint security
- End-user
- Enterprise data hub
- Enterprise Resource Planning (ERP)
- Entity
- Entity embeddings
- Entity linking
- Erroneous data
- EternalBlue
- EternalChampion
- EternalRomance
- Ethernet
- ETL
- ETL (Extract, Transform, Load)
- Event
- Event-driven architecture
- Event-driven programming
- Evolutionary algorithms
- Evolutionary computing
- Exception handling
- Executable
- Executable and Link Format (ELF)
- Executable module
- Execution
- Execution plan (SQL)
- Existence detection
- Exploit
- Exploit kit
- Exponential smoothing
- Expression
- Extended Validation SSL Certificate (EV SSL)
- External library
- Extreme data
F
- F1 score
- Family
- FastAPI
- Fast AI
- Fault-tolerant computer system
- Fear, uncertainty, and doubt (FUD)
- Feasibility study
- Feature engineering
- Feature extraction
- Feature importance
- Feature scaling
- Feature selection
- Fetch execute cycle
- Few-shot learning
- Field
- Filename extension
- File format
- File type
- File-based attack
- File-based database
- Filter (software)
- Fine-tuning
- Fingerprinting
- Firewall
- Firewalls
- Firmware
- Flash memory
- Flask
- Flat file database
- Floating point arithmetic
- Flowcharts
- Flux
- Foothold expansion
- Foreign key
- Formal methods
- Formal verification
- Format check
- For loop
- Foundation models
- Framework
- Fraud
- Freeware
- Free software
- Frequently Asked Questions (FAQ)
- Full duplex
- Functional programming
- Function as a Service (FaaS)
G
- Game theory
- Garbage in, garbage out (GIGO)
- Gaussian mixture models
- Gaussian processes
- GB
- General Data Protection Regulation (GDPR)
- Generative Adversarial Networks (GANs)
- Generative AI
- Genomics
- Gensim
- Geo proxing
- Gigabyte
- Globally unique identifier (GUID)
- Global variable
- GPU
- Gradient boosting
- Gradient descent
- Graphical User Interface (GUI)
- Graphics Interchange Format
- Graph neural networks
- Graph theory
- Graymail
- Greyware
- Grid search
- Griefing
- GUI
H
- Hacker
- Hacking
- Hacktivism
- Hacktivist
- Half duplex
- Hamiltonian Monte Carlo
- Handle
- Hard Disk Drive (HDD)
- Hard problem
- Hash function
- Hash table
- Hash value
- Heap
- Heapsort
- Heap spray
- Heap spraying
- Heartbleed
- HermeticWiper
- Heterogeneous graph neural networks
- Heuristic analysis
- Hexadecimal
- Hibernation
- Hidden Markov models
- Hierarchical Bayesian models
- High level languages
- Hijacker
- Hoax
- Homograph
- Homograph attacks
- Hosted Jupyter
- Hosted notebooks
- Hosting
- Host Intrusion Prevention System (HIPS)
- Host-based solution
- HTML
- HTTP
- HTTPS proxy
- HTTP proxy
- Hugging Face
- Human-Computer Interaction (HCI)
- Human-in-the-Loop
- Hybrid OLAP (HOLAP)
- Hybrid recommender systems
- Hybrid recommender systems
- Hyperlink
- Hyperparameter tuning
- Hypertext Markup Language (HTML)
- Hyper-Text Transfer Protocol Secure (HTTPS)
- Hyper-Text Transfer Protocol (HTTP)
I
- IDE
- Identifier
- Identity and Access Management (IAM)
- Identity and Access Management (IAM)
- Identity theft
- Identity theft
- Image processing
- Image processing
- Imbalanced data
- Imperative programming
- Incident scope
- Incremental build model
- Independent component analysis
- Indexing strategies in SQL
- Indicator of Attack (IOA)
- Indicator of Compromise (IOC)
- Infection vector
- Information architecture
- Information retrieval
- Information space analysis
- Information Technology (IT)
- Information visualization
- Inheritance
- Initial access brokers (IABs)
- Injection attacks
- Input device
- Input mask
- Input/Output (I/O)
- Insertion sort
- Instruction cycle
- Integer
- Integrated Development Environment (IDE)
- Integration testing
- Intellectual Property (IP)
- Intelligent agent
- Interactive whiteboard
- Interface
- Internal documentation
- Internationalized domain names (IDN)
- Internet
- Internet bot
- Internet of Things (IoT)
- Internet Protocol version 6 (IPv4)
- Internet Protocol version 4 (IPv6)
- Internet Protocol (IP)
- Internet Service Provider (ISP)
- Internet streams
- Interpretability in machine learning
- Interpreter
- Interrupt
- Interrupt handler
- Intranet
- Intrusion Prevention System (IPS)
- Invariant
- Inverse reinforcement learning
- iOS
- IPv4 proxy
- IPv6 proxy
- IP address
- Isolation Forest
- Iteration
J
K
L
- Label encoding
- Label smoothing
- LAN
- Large language models
- Latency
- Latent dirichlet allocation
- Latent dirichlet allocation
- Latent semantic analysis
- Lateral movement
- Layered Service Provider (LSP)
- LCD screen
- LED screen
- Lemmatization
- Length check
- Library routine
- Library (computing)
- LightGBM
- Linear discriminant analysis
- Linear regression
- Linear search
- Link
- Linked list
- Linker
- Link prediction
- Linux
- List
- Loader
- Localhost
- Local administrator privileges
- Local Area Network (LAN)
- Logic error
- Logic programming
- Logistic regression
- Long Short-Term Memory (LSTM)
- Lossless compression
- Lossy compression
- Loss functions
- Low level languages
- Low-code app
M
- Machine code
- Machine Learning (ML)
- Machine Vision (MV)
- Machine-to-Machine (M2M)
- MacOS
- Macro
- Macro virus
- MAC address
- Madware
- Magecart
- Magnetic storage
- Mail bomb
- Malicious/Destructive payload
- Malspam
- Malvertising
- Malware
- Managed Detection and Response (MDR)
- Managed Service Provider (MSP)
- Many-to-many
- Many-to-one
- Man-in-the-Browser (MitB)
- Man-in-the-Middle (MitM)
- MapReduce
- MAR
- Markov Chain Monte Carlo (MCMC)
- Masked language models
- Master Boot Record (MBR)
- Mathematical logic
- Matrix
- Max pooling
- MDR
- Mean shift clustering
- Memory
- Memory address register
- Memory data register
- Memory dump
- Memory resident
- Merge sort
- Metadata
- Metaflow
- Meta-learning
- Method
- Methodology
- Metropolitan Area Network (MAN)
- Microphone
- Middelware
- MIDI
- Miner
- Mitigation
- MITRE ATT&CK framework
- Mixed reality
- MLflow
- MLOps platforms
- MLOps (Machine Learning Operations)
- Mobile proxy
- Mobile responsive
- Mobile security
- Model drift
- Model evaluation
- Model monitoring
- Modem
- Money mule
- Mouse
- Mozilla Firefox browser
- MP3
- MP4
- Multilabel classification
- Multilayer Perceptron (MLP)
- Multimedia Messaging Service (MMS)
- Multimodal learning
- Multimodal pre-training
- Multiplatform
- Multitask learning
- Multi-Dimensional OLAP (MOLAP)
- Multi-Factor Authentication (MFA)
- Multi-table join
- Multi-tenancy
- Mumblehard malware
N
- Naive bayes
- Named Entity Recognition (NER)
- NAND logic gate
- National Cyber Security Centre (NCSC)
- National Institute of Standards and Technology (NIST)
- National Security Agency (NSA)
- Natural Language Generation (NLG)
- Natural Language Processing (NLP)
- Near-Field Communication (NFC)
- Network
- Network interface card
- Network perimeter
- Network segmentation
- Net neutrality
- Neural networks
- NewTab
- Next Generation Antivirus (NGAV)
- NIC
- Node
- Nominal data
- Non-negative Matrix Factorization (NMF)
- Non-Volatile
- Normalization
- Normalization in Data Preprocessing
- Normal data
- NOR logic gate
- NoSQL
- NOT logic gate
- Number theory
- Numerical analysis
- Numerical method
- NumPy
- N-grams
O
- Obfuscation
- Object
- Object code
- Object detection
- Object recognition
- Object-Oriented Analysis and Design (OOAD)
- Object-Oriented Programming (OOP)
- ODBC connection
- OLAP database
- One-hot encoding
- One-shot learning
- One-to-one
- OpenAI Five
- OpenSSL
- Open Systems Interconnection (OSI)
- Open-Source Software (OSS)
- Operating System (OS)
- Operational AI
- Opera browser
- Opportunistic attack
- Optical fiber
- Optical storage
- Optimization algorithms
- Ordinal data
- Ordinal regression
- OR logic gate
- OS
- Outlier detection
- Output device
- Out-of-distribution detection
- Overfitting in machine learning
P
- Packer
- Packet switching
- PageRank
- Pair programming
- PAN
- Pandas
- Pandas profiling
- Parallel computing
- Parallel data transmission
- Parameter
- Paraphrasing
- Parity check
- Parquet
- Part-of-Speech (POS) tagging
- Passcode
- Passphrase
- Password
- Password cracking
- Password cracking application
- Password guessing
- Password manager
- Patch management software
- Payload
- PayPal
- PC
- Peer-to-Peer Network
- Peer-to-Peer (P2P)
- Penetration testing
- Peopleware
- Perceptron
- Peripheral
- Personally Identifiable Data
- Personally Identifiable Information (PII)
- Personally Identifiable Information (PII)
- Personal area network
- Personal Identification Number (PIN)
- Pharma
- Pharming
- Phishing
- Phishing attack
- Phishing kit
- Phreaking
- Pivot table
- Plagiarism
- Plaintext
- Platform
- Plotly
- Plugin
- Pointer
- Point-of-Sale (PoS) malware
- Polymorphism
- Polynomial regression
- Portable device
- Portable Executable (PE) file header
- Postcondition
- PowerShell
- Power user
- Precision
- Precondition
- Predictive analytics
- Preinstalled software
- Presence check
- Pre-trained language models
- Primary key
- Primary storage
- Primitive data type
- Priority queue
- Private proxy
- Privilege escalation
- Procedural programming
- Procedure
- Professional Service Automation (PSA)
- Programming language
- Programming language implementation
- Programming language theory
- Program counter
- Program lifecycle phase
- Progressive Web Apps (PWAs)
- Prolog
- Proof of concept
- Prophet
- Protector
- Protocol
- Proxifier
- Proximal policy optimization
- Proxy
- Proxy list
- Proxy server
- Proxy servers
- Proxy service
- Pseudocode
- Public proxy
- PUM
- Punycode
- PUP
- Pyro
- PySpark
- Python
- PyTorch
- PyTorch Lightning
- P-value
Q
R
- Radix
- RAM scraping
- Random Access Memory (RAM)
- Random forests
- Random sample
- Range check
- Ransomware
- Ransomware-as-a-service
- RAR
- Raw data
- Ray
- RDBMS
- Recall
- Recon
- Record
- Recursion
- Recursive Common Table Expressions (CTEs)
- Redundancy
- Reference
- Reference counting
- Referential integrity
- Register
- Regression
- Regression testing
- Regularization (L1, L2)
- Regularized greedy forest
- Relational database
- Relational OLAP
- Reliability engineering
- Remediation
- Remote access
- Remote Administration Tool (RAT)
- Remote Code Execution (RCE) attack
- Remote Desktop Protocol (RDP)
- Remote Monitoring and Management (RMM)
- Remote user
- Requirements analysis
- Residential proxy
- Responsive design
- Retrovirus
- Riskware
- Robocall
- Robotics
- ROM
- Rootkit
- Round-off error
- Router
- Routing table
- RunPE technique
- Run time
- Run time error
- R programming language
- R-squared
S
- S3 bucket
- SaaS
- Safe mode
- Sampling techniques
- Sandbox solution
- Scala
- Scam
- Scanner
- Schema
- Scikit-learn
- Screenlocker
- Screen scraper
- Script kiddie
- Search algorithm
- Search neutrality
- Seasonal Decomposition of a Time Series (STL)
- Secondary storage
- Secure Sockets Layer (SSL)
- Security Information and Event Management (SIEM)
- Security Orchestration, Automation and Response (SOAR)
- Seed
- Selection sort
- Selection statement
- Self-supervised learning
- Semantics
- Semantic Parsing
- Semantic role labeling
- Semi-structured data
- Semi-supervised learning
- Sensor
- Sentiment analysis
- SEO
- Sequence
- Sequence transduction
- Sequence-to-Sequence models (Seq2Seq)
- Serializability
- Serialization
- Serial data transmission
- Server
- Serverless
- Server Message Block (SMB)
- Server-side scripting
- Service layer
- Service-level agreement (SLA)
- Set
- Sextortion
- Shared hosting
- Shared proxy
- Shareware
- Shimming
- SIEM
- Signature
- Similarity metrics
- SIMjacking
- Simplex
- Singleton variable
- Skimming
- Smart home
- SMOTE
- SMS phishing (Smishing)
- Snowflake
- SOC
- Social engineering
- Social networks
- SOCKS
- SOCKS4
- SOCKS5
- SOCKS5 proxy
- SOCKS proxy
- Software
- Software agent
- Software construction
- Software delivery layer
- Software deployment
- Software design
- Software development
- Software Development Kit (SDK)
- Software development process
- Software engineering
- Software maintenance
- Software prototyping
- Software requirements specification
- Software testing
- Software vulnerability
- Software-as-a-Service
- Soft computing
- Solid state
- Solid State Drive (SSD)
- Sorting algorithm
- Source code
- spaCy
- Spam
- Spambot
- Spear phishing
- Spiral model
- Spyware
- SQL
- SQL injection
- SRAM
- SSD
- SSL certificate
- Stack
- Stalkerware
- State
- Statement
- Steganography
- Stemming in Natural Language Processing
- Stochastic gradient descent
- Stopword removal
- Storage
- Stream
- Stream cipher
- String
- Structured storage
- Subroutine
- Supply-chain attack
- Suspicious activity
- Symbian malware
- Symbolic computation
- Symmetric encryption
- Synchronous data transmission
- Syntax
- Syntax error
- System console
- System on a Chip (SoC)
- System optimizer
T
- Table
- Table view
- TabNet
- Tab separated values
- Targeted attack
- Teacher forcing
- Technical documentation
- Telegram
- Tensorflow
- Term Frequency-Inverse Document Frequency (TF-IDF)
- Text generation
- Text summarization
- Text-to-Image synthesis
- The United States Computer Emergency Readiness Team (US-CERT)
- Third party
- Third party patch management
- Third-generation programming language
- Threat actor
- Threat detection and response
- Threat hunting
- Threat intelligence
- Threat modeling
- Time series decomposition
- Time series forecasting
- Time series snalysis
- TLD
- Token
- Tokenization in natural language processing
- Tokenization strategies
- Topic Modeling
- Topic modeling algorithms (LDA, NMF, PLSA)
- Top-down and bottom-up design
- Torrent
- Torrent client
- Tor browser
- Touchscreen
- Trackball
- Trackware
- Training and test sets in machine learning
- Transfer learning
- Transformers in natural language processing
- Transformer-XL
- Translator
- Transport Layer Security (TLS)
- Trans-border data flow
- Trax library
- Tree
- Trojan
- Trolling
- Troubleshooting
- Truth table
- Turing test
- Type check
- Type theory
- Typosquatting
- T-test
U
- Ubiquitous computing (Ubicomp)
- Ubuntu
- Underfitting
- Unicode
- Unicode Transformation Format (UTF)
- Uniform Resource Locator (URL)
- Universal authentication
- Universal Serial Bus (USB)
- UNIX
- Unstructured data
- Unsupervised learning
- Uplift modeling
- Upload
- Urban legend
- URL
- USB attack
- USB boot
- Usenet
- User
- User agent
- User interface
- User interface design
- User interface (UI)
V
- Validation
- Vapnik-Chervonenkis (VC) dimension
- Vaporware
- Variable
- Variant
- Variational autoencoders
- Vector quantization
- Vector Quantized Generative Adversarial Network (VQGAN)
- Verification
- Version control
- Version control systems (Git, SVN)
- Virgin proxy
- Virtual Machine (VM)
- Virtual memory
- Virtual Private Network (VPN)
- Virtual Private Server (VPS)
- Virtual Reality (VR)
- Virus
- Virus hoax
- Vishing
- Visual check
- Visual spoofing
- ViT (Vision Transformer)
- VLAN
- VM-aware
- Voice authentication
- Voice over Internet Protocol (VoIP)
- Voice phishing (Vishing)
- Voice Synthesis
- Volatile
- Volume-based pricing software
- Vulnerabilities
- V-model
W
- Walled garden
- WAN
- WAP
- Warez
- Warm boot
- Warm standby
- WASP
- Waterfall model
- Watering hole attack
- Waveform audio file format
- Wayback Machine
- Wearable computer
- Wearable device
- Web
- Weblink
- Website
- Website defacement
- Website monitoring
- Website spoofing
- Web application security
- Web browser
- Web cache
- Web crawler
- Web inject
- Web scraping
- Web server
- Web skimmer
- Web-enabled
- Weighted ensemble
- Wetware
- Whack-a-mole
- Whaling
- Whitelist
- White hat hacker
- White Screen of Death (WSoD)
- White space padding
- WHOIS
- Wide and deep learning
- Wide Area Network (WAN)
- Windows
- Windows Sockets API (Winsock)
- WireGuard
- Wireless
- Wiretap trojan
- Wi-Fi
- WLAN
- Word embeddings (Word2Vec, GloVe, FastText)
- World Wide Web (WWW)
- Worm
- WoT
- WPA
- WPA2
- WPAN
- WPA-PSK
- Write protection
- WYSIWYG
Explore the comprehensive glossary of proxy terms on ProxyCompass. This alphabetical index provides definitions and explanations of key terms related to proxy servers and their functionalities. From basic concepts to advanced technical terms, our glossary covers everything you need to know to navigate the proxy landscape with confidence.
Browse through the entries from A to Z and unravel the mysteries behind terms like IP authentication, datacenter proxies, residential proxies, network protocols, security measures, and much more. Whether you’re a beginner looking to build your proxy knowledge or an experienced user seeking to deepen your understanding, our glossary has you covered.
Each entry is crafted to provide clear and concise explanations, ensuring that you grasp the core concepts without any confusion. Empower yourself with the language and terminology of proxy servers, enabling you to make informed decisions and optimize your online activities.
Click on any letter above to start exploring the glossary. Expand your proxy vocabulary, enhance your understanding, and unlock the true potential of proxies with ProxyCompass.