Hosting Glossary
273+ hosting terms explained. Understand the terminology behind web hosting.
// jump_to_letter
// browse_by_category
A Record
A DNS record that maps a domain name to an IPv4 address.
AAAA Record
A DNS record that maps a domain name to an IPv6 address.
Above the Fold
The portion of a web page visible without scrolling, important for first impressions and performance.
ACID
ACID describes database transaction properties: Atomicity, Consistency, Isolation, and Durability for reliable processing.
ACME
A protocol for automating SSL certificate issuance and renewal, used by Lets Encrypt.
Addon Domain
An additional domain hosted on the same hosting account, separate from the primary domain.
Ansible
Ansible is an automation tool for configuration management, application deployment, and task automation using YAML playbooks.
Anycast
Routing technique where same IP address exists in multiple locations.
Apache
The most widely used web server software, known for flexibility and extensive module support.
API (Application Programming Interface)
A set of rules and protocols that allows different software applications to communicate.
API Gateway
Service that manages, secures, and routes API requests.
ARP
ARP maps IP addresses to MAC addresses on a local network, enabling data link layer communication.
Auto-Scaling
Automatically adjusting compute resources based on demand to maintain performance and optimize costs.
Autonomous System
An autonomous system is a large network or group of networks under a single administrative domain with a unified routing policy, identified by a unique AS number.
Availability Zone
An isolated location within a cloud region with independent power, cooling, and networking.
AWS Lambda
Amazon serverless compute service that runs code in response to events.
BaaS
A cloud service model that provides ready-made backend functionality like authentication, databases, and file storage.
Backup
A copy of your website files and database stored separately for disaster recovery purposes.
Backup Rotation
A scheme for managing backup retention, typically keeping daily, weekly, and monthly backups.
Bandwidth
The amount of data that can be transferred between your website and visitors over a given period, usually measured monthly.
Bandwidth Throttling
Intentionally limiting network speed, often to manage congestion or enforce limits.
Bare Metal Server
A physical server dedicated entirely to one customer without virtualization.
BGP (Border Gateway Protocol)
Protocol routing traffic between large networks on the internet.
Block Storage
Block storage divides data into fixed-size blocks, providing raw storage volumes that can be formatted with any filesystem.
Blue-Green Deployment
Blue-green deployment runs two identical production environments, allowing instant rollback by switching traffic.
Bounce Rate
The percentage of visitors who leave after viewing only one page without further interaction.
Brute Force
An attack method that tries many passwords or keys systematically until finding the correct one.
BTRFS
Modern Linux filesystem with features like snapshots and checksums.
Bundling
Combining multiple files into fewer files to reduce HTTP requests and improve load times.
Cache Hit
When requested data is found in a cache, avoiding the need to fetch from the origin source.
Cache Miss
When requested data is not found in cache and must be fetched from the origin source.
Caching
Storing frequently accessed data temporarily to reduce server load and improve website loading speed.
Caddy
Caddy is a modern web server with automatic HTTPS, known for its simple configuration and security defaults.
Canary Deployment
Canary deployment gradually rolls out changes to a small subset of users before deploying to the entire infrastructure.
Canonical URL
The preferred URL for a page when multiple URLs lead to the same content, preventing duplicate content issues.
CAP Theorem
CAP theorem states that a distributed system can only guarantee two of three properties: Consistency, Availability, and Partition tolerance.
CcTLD
A top-level domain reserved for a specific country, like .uk for United Kingdom.
CDN (Content Delivery Network)
A network of servers distributed globally that cache and deliver website content from locations closest to visitors.
Certificate Authority
A CA is a trusted entity that issues digital certificates, verifying the identity of certificate holders.
CI/CD
Continuous Integration and Continuous Deployment - automated processes for testing and deploying code.
Cloud Hosting
Hosting that uses multiple connected servers to provide scalable and reliable website hosting with resource flexibility.
CLS
A Core Web Vital metric measuring visual stability by tracking unexpected layout shifts during page load.
CMS (Content Management System)
Software that allows users to create, manage, and modify website content without coding knowledge.
CNAME Record
A DNS record that creates an alias pointing one domain to another domain.
Code Splitting
Breaking code into smaller chunks loaded on demand rather than all at once.
Cold Standby
A backup system that is not running and must be started when the primary fails.
Colocation
A service where you own the server hardware but rent space, power, and network connectivity in a data center.
Connection Pooling
Reusing database connections instead of creating new ones for each request.
Container
A container is a lightweight, standalone executable package that includes everything needed to run an application.
Container Orchestration
Automated management of containerized applications across multiple hosts.
Containers
Lightweight, standalone packages that include everything needed to run an application.
Conversion Rate
The percentage of visitors who complete a desired action like purchase or signup.
Core Web Vitals
A set of Google metrics (LCP, FID, CLS) measuring real-world user experience for loading, interactivity, and stability.
CORS
Cross-Origin Resource Sharing - controls which domains can access your resources.
CPanel
A popular web-based control panel that provides a graphical interface for managing web hosting accounts.
Cron
A time-based job scheduler in Unix-like systems for running commands at specified times.
Cron Job
A scheduled task that runs automatically at specified times on Unix/Linux servers.
CSP (Content Security Policy)
Security header controlling what resources browsers can load.
CSRF (Cross-Site Request Forgery)
Attack that tricks users into performing unwanted actions on authenticated sites.
Daemon
A background process that runs continuously, handling service requests.
Data Center
A facility housing servers and networking equipment that provides hosting infrastructure.
Database Index
A data structure that improves the speed of data retrieval operations on database tables.
Database Indexing
Data structures that improve database query speed.
DDoS
An attack that overwhelms a server or network with traffic from multiple sources to make it unavailable.
DDoS Protection
Security measures that protect websites from Distributed Denial of Service attacks that overwhelm servers with traffic.
Dedicated Hosting
Hosting where an entire physical server is dedicated to a single customer, providing maximum performance and control.
DHCP
DHCP automatically assigns IP addresses and network configuration to devices on a network.
Disk Space
The amount of storage space allocated for your website files, databases, emails, and other data on the server.
DKIM
An email authentication method that adds a digital signature to verify message integrity.
DMARC
An email policy that tells receivers how to handle emails that fail SPF or DKIM checks.
DNS (Domain Name System)
The system that translates human-readable domain names into IP addresses that computers use to identify servers.
Docker
A platform for building, shipping, and running applications in containers.
Docker Swarm
Docker native container orchestration tool.
Domain Name
The human-readable address of a website (e.g., example.com) that visitors type into their browser.
Domain Registrar
A company accredited to register and manage domain names on behalf of customers.
Edge Computing
Processing data near the source rather than in a centralized data center to reduce latency.
Edge Server
A server located at the network edge, close to end users, to reduce latency and improve performance.
Egress
Outbound data transfer from a cloud or hosting provider to the internet or other networks.
Elasticity
The ability of a system to automatically provision and de-provision resources as demand changes.
Email Hosting
A service that hosts email servers, allowing you to use custom email addresses with your domain.
Envoy Proxy
High-performance edge and service proxy designed for cloud-native apps.
Eventual Consistency
Eventual consistency is a model where updates propagate eventually but not immediately, prioritizing availability.
FaaS (Functions as a Service)
Serverless computing model where you deploy individual functions.
Fail2ban
A Linux intrusion prevention tool that bans IPs showing malicious signs like failed login attempts.
Failover
Automatic switching to a backup server when the primary server fails.
FCP
A web performance metric measuring when the browser renders the first piece of content from the DOM.
Firewall
Security software or hardware that monitors and controls incoming and outgoing network traffic based on security rules.
FTP (File Transfer Protocol)
A standard protocol for transferring files between a computer and a web server.
Full Backup
A complete copy of all data, serving as a baseline for incremental or differential backups.
GDPR
EU General Data Protection Regulation governing personal data.
Git
A distributed version control system for tracking changes in source code.
GitOps
GitOps is a practice where Git repositories are the source of truth for infrastructure and application deployments.
GraphQL
A query language for APIs allowing clients to request exactly the data they need.
GTLD
Top-level domains not associated with countries, like .com, .org, or newer ones like .app.
Headless CMS
A CMS that provides content via API without a built-in frontend, allowing any frontend technology.
Helm
Package manager for Kubernetes applications.
High Availability
A system design approach ensuring minimal downtime through redundancy and failover capabilities.
HIPAA
US law protecting sensitive patient health information.
Horizontal Scaling
Adding more machines to a system to handle increased load, also known as scaling out.
Hot Standby
Backup system running and ready to take over immediately if primary fails.
HSTS
HTTP Strict Transport Security - tells browsers to always use HTTPS.
Htaccess
A configuration file for Apache web servers that controls directory-level settings.
HTTP (Hypertext Transfer Protocol)
The protocol used for transmitting web pages and data over the internet.
HTTP/3
The latest HTTP version using QUIC protocol for faster, more reliable web connections.
HTTPS (HTTP Secure)
The secure version of HTTP that encrypts data transmission using SSL/TLS.
Hyperscaler
A large-scale cloud provider with massive infrastructure capable of scaling to millions of users.
Hypervisor
Software that creates and runs virtual machines by dividing hardware resources.
IaaS (Infrastructure as a Service)
Cloud computing providing virtualized computing resources over the internet.
IAM
IAM encompasses policies and technologies for managing digital identities and controlling access to resources.
IDS
An IDS monitors network traffic for suspicious activity and alerts administrators to potential threats.
IMAP (Internet Message Access Protocol)
An email protocol that stores messages on the server, allowing access from multiple devices.
Incremental Backup
A backup that only stores changes made since the last backup, saving storage space and time.
Infrastructure as Code
IaC manages and provisions infrastructure through code and configuration files instead of manual processes.
Ingress
Kubernetes resource managing external access to services in a cluster.
Init System
The first process started during boot that manages services and system initialization.
Inode
A data structure that stores information about files on Unix/Linux systems, used as a file count limit.
Internet Exchange Point
An IXP is a physical location where different internet networks connect and exchange traffic, reducing latency and costs.
IOPS
Input/Output Operations Per Second - measure of storage performance.
IP Address
A unique numerical identifier assigned to devices on a network, including web servers.
IPS
An IPS monitors network traffic and actively blocks detected threats, going beyond detection to prevention.
IPv6
Latest Internet Protocol version with vastly more addresses than IPv4.
ISCSI
ISCSI is a protocol that allows SCSI commands to be sent over IP networks for block-level storage access.
Istio
Popular open source service mesh for Kubernetes.
IXP (Internet Exchange Point)
Physical location where networks connect to exchange traffic.
Kernel
The core of an operating system that manages hardware resources and system calls.
Kubectl
Kubectl is the command-line tool for interacting with Kubernetes clusters to manage resources and deployments.
Kubernetes
An open-source container orchestration platform for automating deployment, scaling, and management of containerized applications.
KVM (Kernel-based Virtual Machine)
Linux kernel virtualization infrastructure for running virtual machines.
Latency
The time delay between a user request and the server response, often called ping time or response time.
Lazy Loading
Deferring the loading of non-critical resources until they are needed.
LCP
A Core Web Vital metric measuring when the largest content element becomes visible in the viewport.
Lets Encrypt
A free, automated certificate authority providing SSL/TLS certificates to enable HTTPS.
LiteSpeed
A high-performance web server known for speed and efficiency, often used as an Apache replacement.
Load Average
A measure of system CPU demand over 1, 5, and 15 minute periods.
Load Balancing
Distributing incoming traffic across multiple servers to ensure no single server becomes overwhelmed.
LVM
LVM provides flexible disk management in Linux, allowing dynamic resizing and spanning volumes across multiple disks.
LXC
LXC provides OS-level virtualization for running multiple isolated Linux systems on a single host.
Managed Hosting
Hosting service where the provider handles server management tasks including updates, security, and optimization.
Memcached
A distributed memory caching system for speeding up dynamic web applications.
Memory Limit
The maximum amount of RAM a PHP script can use during execution.
MFA
MFA requires two or more verification methods to prove identity, combining something you know, have, or are.
Migration
The process of moving a website from one hosting provider to another or between servers.
Minification
Removing unnecessary characters from code (spaces, comments) to reduce file size without changing functionality.
Mitigation
Actions taken to reduce the severity or impact of an attack or security threat.
Mixed Content
When an HTTPS page loads resources over insecure HTTP, causing security warnings.
MTU
MTU is the largest packet size that can be transmitted over a network without fragmentation, typically 1500 bytes for Ethernet.
Multi-Domain SSL
An SSL certificate that secures multiple different domain names with a single certificate.
Multi-Tenant
An architecture where a single instance of software serves multiple customers (tenants), sharing resources while keeping data isolated.
Multicast
Multicast is one-to-many network transmission where data is sent to a group of interested receivers simultaneously.
MX Record
A DNS record specifying which mail servers handle email for a domain.
MySQL
A popular open-source relational database management system commonly used with PHP and WordPress.
Nameserver
A server that translates domain names into IP addresses and handles DNS queries.
Nameservers
Servers that translate domain names to IP addresses and direct traffic to the correct hosting server.
NAS
NAS is a file-level storage device connected to a network, providing centralized data access for multiple clients.
NAT (Network Address Translation)
Remapping IP addresses between networks to allow multiple devices to share one public IP.
Network Socket
An endpoint for network communication, identified by IP address and port number.
Nginx
A high-performance web server known for handling concurrent connections efficiently and reverse proxy capabilities.
NVMe (Non-Volatile Memory Express)
A high-speed storage interface that connects SSDs directly to the CPU for maximum performance.
Object Caching
Caching database queries and computed results in memory for faster retrieval.
Object Storage
Object storage manages data as objects with metadata rather than files or blocks, ideal for unstructured data at scale.
OpenVZ
Container-based virtualization for Linux allowing multiple isolated containers.
Origin Server
The original server hosting your content, as opposed to cache servers or CDN edge servers.
ORM
ORM is a technique that maps database tables to programming language objects, simplifying database operations in code.
OWASP
Open Web Application Security Project - organization defining security standards.
PaaS (Platform as a Service)
Cloud platform for deploying applications without managing infrastructure.
Parked Domain
A domain that points to your main domain, displaying the same content.
PCI-DSS
Payment Card Industry Data Security Standard for handling card data.
Peering
Direct connection between networks for exchanging traffic.
Penetration Testing
Authorized simulated attack to evaluate security.
Permalink
A permanent URL for a specific page or post that remains constant over time.
PHP
A popular server-side scripting language used to build dynamic websites, including WordPress.
PHP Workers
Server processes that handle PHP requests simultaneously, determining how many users can be served at once.
PID
A unique number assigned by the operating system to identify each running process.
PKI
PKI is a system for creating, managing, and validating digital certificates used for secure communication.
Plesk
A commercial web hosting control panel alternative to cPanel, popular on Windows servers.
Pod
A pod is the smallest deployable unit in Kubernetes, consisting of one or more containers that share storage and network.
PoP (Point of Presence)
Location where a network has equipment to serve an area.
POP3 (Post Office Protocol)
An email protocol that downloads messages to a local device and optionally deletes them from the server.
Port
A numeric identifier for network services, allowing multiple services on one IP.
Proxy Server
Server that acts as intermediary between clients and other servers.
QEMU
QEMU is an open-source machine emulator and virtualizer, often used with KVM for hardware-accelerated virtualization.
Query Optimization
Improving database queries to run faster and use fewer resources.
QUIC
A modern transport protocol built on UDP, providing faster connections than TCP.
RAID
Redundant Array of Independent Disks for data redundancy and/or performance.
Rate Limiting
Controlling the rate of requests a user can make to an API or service.
RBAC
RBAC assigns permissions to roles rather than individuals, simplifying access management in organizations.
Redirect
A technique to send visitors from one URL to another automatically.
Redis
An in-memory data store used for caching, session storage, and real-time applications.
Region
A geographic location containing multiple data centers or availability zones for cloud services.
Replication
Copying data between servers to ensure redundancy and availability.
Reseller Hosting
A hosting plan that allows you to create and sell hosting accounts to your own customers.
Reserved Instance
A commitment to use specific cloud resources for 1-3 years in exchange for significant discounts.
Responsive Design
A design approach where websites adapt their layout to different screen sizes and devices.
REST API
An architectural style for APIs using standard HTTP methods on resources.
Reverse Proxy
A server that sits between clients and backend servers, forwarding requests and providing additional functionality.
Robots.txt
A file telling search engine crawlers which pages or sections to crawl or avoid.
Rolling Deployment
Rolling deployment gradually replaces instances of the previous version with the new version one at a time.
Root Access
Administrative access to a server with full control over all system settings and configurations.
RPO
The maximum acceptable amount of data loss measured in time, determining backup frequency.
RTO
The maximum acceptable time to restore service after a failure or disaster.
SaaS (Software as a Service)
Software delivery model where applications are hosted and accessed via internet.
SAN
A SAN is a dedicated high-speed network that provides access to consolidated block-level storage.
SATA
SATA is a standard interface for connecting storage devices like hard drives and SSDs to computers.
Scalability
The ability to increase or decrease hosting resources to match changing demand.
SEO
Practices to improve a websites visibility in search engine results pages.
Serverless Computing
Cloud execution model where the provider manages servers and you pay per execution.
Service Mesh
Infrastructure layer for handling service-to-service communication.
Sharding
Splitting a database across multiple servers for scalability.
Shared Hosting
A type of web hosting where multiple websites share the same server and its resources like CPU, RAM, and storage.
SIEM
SIEM systems collect and analyze security logs from multiple sources to detect threats and compliance issues.
Single-Tenant
An architecture where each customer has their own dedicated instance of software and infrastructure.
SLA (Service Level Agreement)
A contract between hosting provider and customer guaranteeing specific service levels like uptime percentage.
SMTP (Simple Mail Transfer Protocol)
The protocol used for sending emails from clients to servers and between servers.
SOC 2
Security certification for service organizations handling customer data.
SPF
An email authentication method specifying which servers can send email for your domain.
Spot Instance
Unused cloud capacity offered at steep discounts but can be terminated when demand increases.
SQL Injection
Attack inserting malicious SQL code into database queries.
SSD (Solid State Drive)
A storage device using flash memory that provides faster data access and better performance than traditional hard drives.
SSE
A technology for servers to push updates to browsers over HTTP.
SSH (Secure Shell)
A secure protocol for accessing and managing servers remotely via command line.
SSL Certificate
A digital certificate that encrypts data between a website and its visitors, shown as HTTPS in the browser.
SSL Passthrough
Forwarding encrypted SSL/TLS traffic directly to backend servers without decrypting at the proxy.
SSL Termination
Decrypting SSL/TLS traffic at a load balancer or proxy.
Staging Environment
A copy of your production website used for testing changes before deploying them live.
Staging Site
A clone of your live website used for testing changes before deploying to production.
Static Site Generator
A tool that generates static HTML pages from templates and content, served without server-side processing.
Subdomain
A prefix added to your domain name to create a separate web address, like blog.example.com.
Swap Space
Disk space used as virtual memory when RAM is exhausted.
Systemd
A modern init system and service manager used by most Linux distributions.
TCP
A connection-oriented protocol providing reliable, ordered data delivery.
Terraform
Terraform is an infrastructure as code tool that lets you define cloud resources in declarative configuration files.
Throttling
Intentionally slowing down network or service performance.
Throughput
Amount of data transferred in a given time period.
TLD (Top-Level Domain)
The last segment of a domain name, such as .com, .org, .net, or country codes like .uk.
TLS (Transport Layer Security)
Cryptographic protocol securing communications over networks (successor to SSL).
TOTP
TOTP generates temporary passwords that change every 30 seconds based on the current time and a shared secret.
Transit
Purchasing internet connectivity from an upstream provider.
Tree Shaking
Eliminating unused code from bundles to reduce file size.
TTFB (Time To First Byte)
The time from when a browser requests a page to when it receives the first byte of data from the server.
TTL
The duration that data should be cached or considered valid before refreshing or discarding.
Tunnel
Encapsulated network connection carrying traffic securely between points.
TXT Record
A DNS record containing text data, commonly used for verification and email authentication.
UDP
A connectionless protocol for fast, unreliable data transmission without delivery guarantees.
Unicast
Unicast is one-to-one network transmission where data is sent from one source to one specific destination address.
Unmanaged Hosting
Hosting where you are responsible for all server management including security, updates, and configuration.
Uptime
The percentage of time a server or website is operational and accessible to visitors.
URL Slug
The user-friendly part of a URL that identifies a specific page, usually based on the page title.
Varnish
Varnish is a powerful HTTP accelerator and reverse proxy cache designed for content-heavy dynamic websites.
Vertical Scaling
Adding more resources (CPU, RAM) to an existing machine, also known as scaling up.
Viewport
The visible area of a web page in the browser, which varies by device and window size.
VLAN
A VLAN is a logical network partition created within a physical network, allowing network segmentation without physical separation.
VPN (Virtual Private Network)
Encrypted connection over the internet to secure data transmission.
VPS Hosting
Virtual Private Server hosting provides dedicated resources on a virtualized server, offering more power and control than shared hosting.
Vulnerability Scanning
Automated scanning to identify known security weaknesses.
WAF (Web Application Firewall)
A specialized firewall that protects web applications by filtering and monitoring HTTP traffic.
WAF Rules
Conditions defining what traffic a Web Application Firewall blocks.
Web Vitals
A set of quality signals that are essential to delivering a great user experience on the web.
Webhook
An automated HTTP callback that sends data to other applications when specific events occur.
WebSocket
A protocol enabling persistent, bidirectional communication between browser and server.
WHOIS
A public database containing registration information for domain names including owner contact details.
Wildcard Certificate
An SSL certificate that secures a domain and all its subdomains with a single certificate.
Wildcard SSL
An SSL certificate that secures a domain and all its subdomains with a single certificate.
WordPress Hosting
Specialized hosting optimized specifically for WordPress websites with features like one-click installation and WordPress-specific caching.
How We Test Hosting Providers
Our team of DevOps engineers and sysadmins runs real websites on each hosting provider, monitoring uptime, speed, and support quality 24/7. We verify all performance claims with independent testing tools.