World Wide Web

WebWWWthe web
A website may be accessible via a public Internet Protocol (IP) network, such as the Internet, or a private local area network (LAN), by referencing a uniform resource locator (URL) that identifies the site. Websites can have many functions and can be used in various fashions; a website can be a personal website, a corporate website for a company, a government website, an organization website, etc. Websites are typically dedicated to a particular topic or purpose, ranging from entertainment and social networking to providing news and education.

YouTube

YouTube channelYouTube.comYouTube Gaming
Businesses, schools, government agencies, and other private institutions often block social media sites, including YouTube, due to bandwidth limitations and the site's potential for distraction. Several countries have previously blocked access to YouTube: General * Limiting public access and exposure to content that may ignite social or political unrest. Preventing criticism of a ruler (e.g. in North Korea), government (e.g. in China) or its actions (e.g. in Morocco), government officials (e.g. in Turkey and Libya), or religion (e.g. in Pakistan).

Uniform Resource Identifier

URIURI schemeURIs
A Uniform Resource Locator (URL) is a URI that specifies the means of acting upon or obtaining the representation of a resource, i.e. specifying both its primary access mechanism and network location. For example, the URL refers to a resource identified as, whose representation, in the form of HTML and related code, is obtainable via the Hypertext Transfer Protocol (http:) from a network host whose domain name is. A URN may be compared to a person's name, while a URL may be compared to their street address. In other words, a URN identifies an item and a URL provides a method for finding it.

Internet

onlinethe Internetweb
While social networking sites were initially for individuals only, today they are widely used by businesses and other organizations to promote their brands, to market to their customers and to encourage posts to "go viral". "Black hat" social media techniques are also employed by some organizations, such as spam accounts and astroturfing. A risk for both individuals and organizations writing posts (especially public posts) on social networking websites, is that especially foolish or controversial posts occasionally lead to an unexpected and possibly large-scale backlash on social media from other Internet users.

Gmail

Google MailGoogle GmailCriticism of Gmail
Gmail exited the beta status on July 7, 2009. Prior to December 2013, users had to approve to see images in emails, which acted as a security measure. This changed in December 2013, when Google, citing improved image handling, enabled images to be visible without user approval. Images will be routed through Google's secure proxy servers rather than the original external host servers. MarketingLand noted that the change to image handling means email marketers will no longer be able to track the recipient's IP address or information about what kind of device the recipient is using.

Internet censorship

Internet freedomcensorshipInternet filtering
Examples are modifying the Hosts file or typing the IP address instead of the domain name as part of a URL given to a Web browser. Uniform Resource Locator (URL) filtering: URL strings are scanned for target keywords regardless of the domain name specified in the URL. This affects the HTTP protocol. Typical circumvention methods are to use escaped characters in the URL, or to use encrypted protocols such as VPN and TLS/SSL. Packet filtering: Terminate TCP packet transmissions when a certain number of controversial keywords are detected. This affects all TCP-based protocols such as HTTP, FTP and POP, but Search engine results pages are more likely to be censored.

Deep web

invisible webDeep web (search indexing)dark (unused) address-space
The content of the deep web is hidden behind HTTP forms and includes many very common uses such as web mail, online banking, private or otherwise restricted access social-media pages and profiles, some web forums that require registration for viewing content, and services that users must pay for, and which are protected by paywalls, such as video on demand and some online magazines and newspapers. The content of the deep web can be located and accessed by a direct URL or IP address, but may require a password or other security access to get past public-website pages.

Fake news website

fake newsfake news websitesfake news site
Fraudulent news affected politics in Indonesia and the Philippines, where there was simultaneously widespread usage of social media and limited resources to check the veracity of political claims. German Chancellor Angela Merkel warned of the societal impact of "fake sites, bots, trolls". Fraudulent articles spread through social media during the 2016 U.S. presidential election, and several officials within the U.S. Intelligence Community said that Russia was engaged in spreading fake news. Computer security company FireEye concluded that Russia used social media to spread fake news stories as part of a cyberwarfare campaign.

Index of Internet-related articles

address - IP protocol - IPv4 - IPv6 - IPX - IRC - ISCSI - ISDN - ISO 8601 - ISO 8859-1 JAIN - James H.

Computer network

networkcomputer networkingnetworking
From an engineering viewpoint, the Internet is the set of subnets, and aggregates of subnets, which share the registered IP address space and exchange information about the reachability of those IP addresses using the Border Gateway Protocol. Typically, the human-readable names of servers are translated to IP addresses, transparently to users, via the directory function of the Domain Name System (DNS). Over the Internet, there can be business-to-business (B2B), business-to-consumer (B2C) and consumer-to-consumer (C2C) communications. When money or sensitive information is exchanged, the communications are apt to be protected by some form of communications security mechanism.

Hexadecimal

hex0x16
It is the basis for the W3C standard for URL percent encoding, where a character is replaced with a percent sign "%" and its Base16-encoded form. Most modern programming languages directly include support for formatting and parsing Base16-encoded numbers. Unix (and related) shells, AT&T assembly language and likewise the C programming language (and its syntactic descendants such as C++, C#, D, Java, JavaScript, Python and Windows PowerShell) use the prefix for numeric constants represented in hex: .

Hostname

host namehosthostnames
This kind of hostname is translated into an IP address via the local hosts file, or the Domain Name System (DNS) resolver. It is possible for a single host computer to have several hostnames; but generally the operating system of the host prefers to have one hostname that the host uses for itself. Any domain name can also be a hostname, as long as the restrictions mentioned below are followed. So, for example, both en.wikipedia.org and wikipedia.org are hostnames because they both have IP addresses assigned to them. A hostname may be a domain name, if it is properly organized into the domain name system.

Facebook

Facebook LiveFacebook.comFacebook, Inc.
List of social networking websites. Six degrees of separation. Social graph. Timeline of social media. VK (social networking). WhatsApp. Corporation tax in the Republic of Ireland. Double Irish tax scheme. |mobile=https://m.facebook.com Social media web site. |mobile=https://m.facebook.com Social media web site.

Sina Weibo

WeiboSinaSina microblog
URLs are automatically shortened using the domain name t.cn, akin to Twitter's t.co. Official and third-party applications can access Sina Weibo from other websites or platforms. Since a recent update you can now add images and this has made Sina Weibo more similar to Instagram in its function as a social media platform (also an app) in China. Hashtags differ slightly between Sina Weibo and Twitter, using the double-hashtag "#HashName#" format (the lack of spacing between Chinese characters necessitates a closing tag). Users can own a hashtags by requesting hashtag monitoring; the company reviews these requests and responds within one to three days.

WeChat

WeChat PayWeixinWeChat Mini Program
For example, in Q2 2017, WeChat's revenues from social media advertising were about US$0.9 billion (RMB6 billion) compared to Facebook's total revenues of US$9.3 billion, 98% of which were from social media advertising. WeChat's revenues from its value-added services were US$5.5 billion. According to SimilarWeb, WeChat was the most popular messaging app in China and Bhutan in 2016. WeChat provides text messaging, hold-to-talk voice messaging, broadcast (one-to-many) messaging, video calls and conferencing, video games, photograph and video sharing, as well as location sharing.

Domain name

domaindomain namesdomains
The domain name is a component of a uniform resource locator (URL) used to access web sites, for example: A domain name may point to multiple IP addresses to provide server redundancy for the services offered, a feature that is used to manage the traffic of large, popular web sites. Web hosting services, on the other hand, run servers that are typically assigned only one or a few addresses while serving websites for many domains, a technique referred to as virtual web hosting. Such IP address overloading requires that each request identifies the domain name being referenced, for instance by using the HTTP request header field Host:, or Server Name Indication.

Address space

addressaddressableaddressed
Uniform resource locators in the Internet. Linear address space. Name space. Virtualization.

Web 2.0

Enterprise 2.02.0Web2.0
The campaign used social media platforms, for example, Facebook and Twitter, to promote this competition, and requested the participants to share experiences, pictures and videos on social media platforms. As a result, Colorado enhanced their image as a winter destination and created a campaign worth about $2.9 million. The tourism organisation can earn brand royalty from interactive marketing campaigns on social media with engaging passive communication tactics. For example, “Moms” advisors of the Walt Disney World are responsible for offering suggestions and replying to questions about the family trips at Walt Disney World.

Domain Name System

DNSresource recordDNS record
An often-used analogy to explain the Domain Name System is that it serves as the phone book for the Internet by translating human-friendly computer hostnames into IP addresses. For example, the domain name www.example.com translates to the addresses (IPv4) and (IPv6). The DNS can be quickly and transparently updated, allowing a service's location on the network to change without affecting the end users, who continue to use the same hostname. Users take advantage of this when they use meaningful Uniform Resource Locators (URLs) and e-mail addresses without having to know how the computer actually locates the services.

Blacklist (computing)

blacklistblacklistsBlacklisting
Yet another form of list is the yellow list which is a list of email server IP addresses that send mostly good email but do send some spam. Examples include Yahoo, Hotmail, and Gmail. A yellow listed server is a server that should never be accidentally blacklisted. The yellow list is checked first and if listed then blacklist tests are ignored. In Linux modprobe, the entry in a modprobe configuration file indicates that all of the particular module's internal aliases are to be ignored. There are cases where two or more modules both support the same devices, or a module invalidly claims to support a device.

LinkedIn

Linked InLinkedIn AnswersDan Nye
List of social networking websites. Reputation systems. Social network. Social software. Timeline of social media.

Slash (punctuation)

slash/solidus
The slash is used in a similar fashion in internet URLs (e.g., ). Often a portion of such URLs corresponds with files on a Unix server with the same name. The slash in an IP address (e.g., 192.0.2.0/29) indicates the prefix size in CIDR notation. The number of addresses of a subnet may be calculated as 2 address size − prefix size, in which the address size is 128 for IPv6 and 32 for IPv4. For example, in IPv4, the prefix size /29 gives: 2 32−29 = 2 3 = 8 addresses. The slash is used as a division operator in most programming languages while APL uses it for reduction (fold) and compression (filter).

Geolocation software

IP geolocationaccessible to users within the UKgeo-IP database
The identification of a device's IP address can be used to determine the country, city, or post/ZIP code, determining an object's geographical location. Other methods include examination of a MAC address, image metadata, or credit card information. An IP address is assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. The protocol specifies that each IP packet must have a header which contains, among other things, the IP address of the sender of the packet.

Proxy server

proxyproxiesproxy servers
By comparing the client's external IP address to the address seen by an external web server, or sometimes by examining the HTTP headers received by a server. A number of sites have been created to address this issue, by reporting the user's IP address as seen by the site back to the user in a web page. Google also returns the IP address as seen by the page if the user searches for "IP". By comparing the result of online IP checkers when accessed using https vs http, as most intercepting proxies do not intercept SSL.

Camera phone

cameracamera phonescameras
Camera phones have also been very useful to street photographers and social documentary photographers as they enable them to take pictures of strangers in the street without them noticing, thus allowing the artist/photographer to get close to her or his subjects and take more lively photos.