Server-side

server sideserverside
Server-side refers to operations that are performed by the server in a client–server relationship in a computer network.wikipedia
115 Related Articles

Client-side

client sideclientclient-
Operations may be performed server-side because they require access to information or functionality that is not available on the client, or because performing such operations on the client side would be slow, unreliable, or insecure.
In a computer security context, client-side vulnerabilities or attacks refer to those that occur on the client / user's computer system, rather than on the server side, or in between the two.

Visual Basic

VBVisual Basic 6Microsoft Visual Basic
This allows for server-side processing or an add-in module.

Java (programming language)

JavaJava programming languageJava language
Servlets are server-side Java EE components that generate responses (typically HTML pages) to requests (typically HTTP requests) from clients.

Server (computing)

serverserversserver computer
Server-side refers to operations that are performed by the server in a client–server relationship in a computer network. Typically, a server is a computer application, such as a web server, that runs on a remote server, reachable from a user's local computer, smartphone, or other device.

Client–server model

client–serverclient-serverclient/server
Server-side refers to operations that are performed by the server in a client–server relationship in a computer network.

Computer network

networkcomputer networkingnetworking
Server-side refers to operations that are performed by the server in a client–server relationship in a computer network.

Application software

applicationapplicationssoftware application
Typically, a server is a computer application, such as a web server, that runs on a remote server, reachable from a user's local computer, smartphone, or other device.

Web server

web serverswebserverHTTP server
Typically, a server is a computer application, such as a web server, that runs on a remote server, reachable from a user's local computer, smartphone, or other device. Client and server programs may be commonly available ones such as free or commercial web servers and web browsers, communicating with each other using standardized protocols.

User (computing)

userusernameusers
Typically, a server is a computer application, such as a web server, that runs on a remote server, reachable from a user's local computer, smartphone, or other device.

Computer

computerscomputer systemdigital computer
Typically, a server is a computer application, such as a web server, that runs on a remote server, reachable from a user's local computer, smartphone, or other device.

Smartphone

smartphonessmart phonesmart phones
Typically, a server is a computer application, such as a web server, that runs on a remote server, reachable from a user's local computer, smartphone, or other device.

Client (computing)

clientclientsclient software
Operations may be performed server-side because they require access to information or functionality that is not available on the client, or because performing such operations on the client side would be slow, unreliable, or insecure.

Computer security

cybersecuritycyber securitysecurity
Operations may be performed server-side because they require access to information or functionality that is not available on the client, or because performing such operations on the client side would be slow, unreliable, or insecure. In a computer security context, server-side vulnerabilities or attacks refer to those that occur on a server computer system, rather than on the client side, or in between the two.

Web browser

browserweb browsersinternet browser
Client and server programs may be commonly available ones such as free or commercial web servers and web browsers, communicating with each other using standardized protocols.

Programmer

software developercomputer programmerdeveloper
Or, programmers may write their own server, client, and communications protocol which can only be used with one another.

Communication protocol

protocolcommunications protocolprotocols
Client and server programs may be commonly available ones such as free or commercial web servers and web browsers, communicating with each other using standardized protocols. Or, programmers may write their own server, client, and communications protocol which can only be used with one another.

Man-in-the-middle attack

man-in-the-middleman in the middle attackman in the middle
In a computer security context, server-side vulnerabilities or attacks refer to those that occur on a server computer system, rather than on the client side, or in between the two.

SQL injection

SQL injection attack SQL injection attacksBlind SQL injection
For example, an attacker might exploit a SQL injection vulnerability in a web application in order to maliciously change or gain unauthorized access to data in the server's database.

Web application

web-basedweb applicationsweb app
For example, an attacker might exploit a SQL injection vulnerability in a web application in order to maliciously change or gain unauthorized access to data in the server's database.

Database

database management systemdatabasesDBMS
For example, an attacker might exploit a SQL injection vulnerability in a web application in order to maliciously change or gain unauthorized access to data in the server's database.

Operating system

operating systemsOScomputer operating system
Alternatively, an attacker might break into a server system using vulnerabilities in the underlying operating system and then be able to access database and other files in the same manner as authorized administrators of the server.

Distributed computing

distributeddistributed systemsdistributed system
In the case of distributed computing projects such as SETI@home and the Great Internet Mersenne Prime Search, while the bulk of the operations occur on the client side, the servers are responsible for coordinating the clients, sending them data to analyze, receiving and storing results, providing reporting functionality to project administrators, etc.

SETI@home

S23-WikiSetiqueue
In the case of distributed computing projects such as SETI@home and the Great Internet Mersenne Prime Search, while the bulk of the operations occur on the client side, the servers are responsible for coordinating the clients, sending them data to analyze, receiving and storing results, providing reporting functionality to project administrators, etc.

Great Internet Mersenne Prime Search

GIMPSDr. Steven BooneGreat Internet Mersenne Prime Search (GIMPS)
In the case of distributed computing projects such as SETI@home and the Great Internet Mersenne Prime Search, while the bulk of the operations occur on the client side, the servers are responsible for coordinating the clients, sending them data to analyze, receiving and storing results, providing reporting functionality to project administrators, etc.

Google Earth

Google Earth Historical ImageryGoogle SkyGoogle Moon
In the case of an Internet-dependent user application like Google Earth, while querying and display of map data takes place on the client side, the server is responsible for permanent storage of map data, resolving user queries into map data to be returned to the client, etc.