finger
a program or utility that can identify a person online from an e-mail address.firewall
a security system employed to protect access to a closed network by means of special software, passwords, and authentication checks.flame war
angry and insulting communications between two or more people via e-mail, chat forums, newsgroups, etc.flaming
angry and insulting communications or posts via e-mail, chat forums, newsgroups, etc.flog
a fake blog, used to promote a product or service.flooding
clogging one's mail server and blocking a recipient's mailbox by sending him or her a mass of spam.frames
separate windows on a Web page that can be scrolled down and accessed while keeping the main page and its menu in view.fraudulent link
a link that appears to be legitimate but in fact directs users to a phony site for criminal purposes.freeware
free software available for downloading from various Internet sites.FTP
file transfer protocol; a program used to send and receive files over the Internet.geek
slang for an Internet know-it-all.ghost site
an abandoned Web site that is no longer maintained. Also known as an Orphan Annie.Google bomb
a method of increasing a search engine's ranking of a Web page by having several sites link to it with the same anchor text.Gopher
an information retrieval system or database searcher..gov
at the end of an Internet or e-mail address, the domain designation for a government institution.handle
in a chat or other online forum, a participant's moniker or name.hijacker
any spyware designed to unethically monitor another's browsing, infect one's computer with pop-up ads, or change search or homepages.history
a list or log of Web sites recently visited.hits
the recorded number of times a Web site has been visited, useful for measuring popularity.home page
the opening Web page of an individual, organization, company, etc.honeymonkey
a computer set up to surf the Web on its own and survey for sites that may load malicious code.honeypot
a computer or operating system set up specifically to lure hackers and log all attempts at access in order to catch scammers or identity thieves.host
a network computer providing multiple services, such as e-mail, for other computers.host name
the first portion of an e-mail or Internet address, identifying a specific computer user.hotlink
see hyperlink.hot spot
any place, such as a coffee shop, with a wireless Internet connection.HTML
hypertext markup language; the language coding used to create Web pages.http
hypertext transfer protocol; the protocol that enables the linking of Web sites.hyperlink
a link made up of glowing text or graphics that when clicked leads directly to another related Web page or site. Also known as a hotlink.hypermedia
an integration of text, graphics, video, and sound.hypertext
a text system used to create links to related documents.instant message
an online medium through which one may communicate instantly a message on another's computer screen. Also, the message itself.internaut
see cybernaut.Internet
a network of computer networks linking computer users worldwide.Internet2
created by scientists in 1996, an independent, fee-based Internet employing faster, more advanced technology, used by universities, government agencies, and some organizations.interactive
of any communications medium, allowing direct, two-way contact.intranet
a communication network of computers restricted to a single company, organization, or building.IP address
an identification number assigned to every computer on the Internet.IRC
Internet relay chat. The protocol that enables computers users who are online to chat or "talk" to one another in real time.ISP
Internet Service Provider, which provides users with access to the Internet.IT
information technology.JAVA
a virus-safe programming language for use on the Internet.JPEG
Joint Photographic Experts Group; a common graphics format used to convey photographs, three-dimensional images, etc.keylogger
a form of spyware from which someone can remotely monitor keystrokes on another user's PC in order to read e-mails or determine which Web sites are visited.kiosk mode
a screen presentation without toolbars, menus, or borders. Also, presentation mode.LAN
a computer network used only on a single floor or in a single building.leeching
the downloading of game and movie files and subsequent refusal to share them with other online users.link
a connection to another Web page or site.link rot
the process over time by which a link may become irrelevant or unneeded, especially when connected to a Web site that is closed or outdated.