Tech Glossary
Clear, jargon-free definitions of 41 technical terms across VPNs, hosting, CRMs, security, and more. Understand what matters before you buy.
Security & Privacy
AES-256 Encryption
AES-256 (Advanced Encryption Standard with 256-bit key length) is a symmetric encryption algorithm used to secure data. ...
DKIM (DomainKeys Identified Mail)
DKIM is an email authentication method that adds a digital signature to outgoing emails, allowing receiving servers to v...
DNS Leak
A DNS leak occurs when your device sends DNS (Domain Name System) queries outside the encrypted VPN tunnel, potentially ...
End-to-End Encryption (E2EE)
End-to-end encryption ensures data is encrypted on the sender's device and can only be decrypted by the intended recipie...
Kill Switch
A kill switch is a security feature that automatically disconnects your device from the internet if the VPN connection d...
No-Logs Policy
A no-logs policy (or zero-logs policy) is a VPN provider's commitment to not record, store, or share any data about user...
Ransomware Protection
Ransomware protection is a security feature that detects and blocks ransomware attacks — malware that encrypts your file...
Real-Time Protection
Real-time protection (or real-time scanning) is an antivirus feature that continuously monitors your system for threats,...
SOC 2 Compliance
SOC 2 (System and Organization Controls 2) is an auditing standard developed by the AICPA that evaluates a service provi...
SSL Certificate
An SSL (Secure Sockets Layer) certificate encrypts data transmitted between a website and its visitors, displaying a pad...
SSO (Single Sign-On)
SSO is an authentication method that lets users access multiple applications with one set of login credentials. After au...
Two-Factor Authentication (2FA)
Two-factor authentication requires two different types of verification to access an account: something you know (passwor...
Zero-Knowledge Encryption
Zero-knowledge encryption (also called zero-knowledge proof architecture) means the service provider encrypts your data ...
Features & Tools
A/B Testing
A/B testing (or split testing) is a method of comparing two versions of an email, landing page, or other marketing asset...
Auto-Attendant
An auto-attendant (or virtual receptionist) is an automated phone system that greets callers and routes them to the appr...
Drag-and-Drop Editor
A drag-and-drop editor is a visual website building interface that lets users create web pages by selecting pre-built el...
E-Filing
E-filing (electronic filing) is the process of submitting tax returns to the IRS and state tax authorities electronicall...
File Versioning
File versioning automatically saves previous versions of your files each time they're modified, allowing you to view, co...
Gantt Chart
A Gantt chart is a horizontal bar chart that visualizes project schedules, showing tasks as bars spanning their start an...
Kanban Board
A Kanban board is a visual project management tool that displays work items as cards organized into columns representing...
Marketing Automation
Marketing automation refers to software and workflows that automatically execute marketing tasks based on triggers and c...
Password Generator
A password generator is a tool that creates random, complex passwords based on configurable criteria such as length, cha...
Professional Monitoring
Professional monitoring is a home security service where a 24/7 monitoring center watches your security system for alert...
Split Tunneling
Split tunneling is a VPN feature that lets you route some of your internet traffic through the VPN while allowing other ...
Technology
API (Application Programming Interface)
An API is a set of rules and protocols that allows different software applications to communicate with each other. APIs ...
CRM Integration
CRM integration refers to connecting your CRM software with other business tools (email, calendar, accounting, marketing...
MOOC (Massive Open Online Course)
A MOOC is an online course designed for unlimited participation and open access via the internet. MOOCs feature video le...
Responsive Design
Responsive design is a web design approach where layouts automatically adjust and reflow to look good on any screen size...
Shared Hosting
Shared hosting is a web hosting model where multiple websites share the same physical server and its resources (CPU, RAM...
VoIP (Voice over Internet Protocol)
VoIP is a technology that enables voice calls over the internet instead of traditional phone lines. It converts voice si...
VPS Hosting
VPS (Virtual Private Server) hosting uses virtualization technology to give you dedicated resources on a shared physical...
WireGuard
WireGuard is a modern, open-source VPN protocol designed for simplicity and high performance. With roughly 4,000 lines o...
Performance
CDN (Content Delivery Network)
A CDN is a network of servers distributed across multiple geographic locations that cache and deliver website content fr...
Email Deliverability
Email deliverability is the rate at which your emails successfully reach recipients' inboxes rather than being filtered ...
Uptime SLA
An uptime SLA (Service Level Agreement) is a hosting provider's contractual guarantee of the percentage of time their se...
Business & Strategy
Agile Methodology
Agile is an iterative approach to project management and software development that delivers work in small, incremental c...
Applicant Tracking System (ATS)
An ATS is software that automates the recruitment process by managing job postings, collecting applications, screening r...
GDPR (General Data Protection Regulation)
GDPR is a European Union regulation on data privacy that governs how organizations collect, process, store, and share pe...
HRIS (Human Resource Information System)
An HRIS is a software system that manages core HR functions including employee data, payroll, benefits administration, t...
Lead Scoring
Lead scoring is a methodology for ranking prospects based on their perceived value to the organization. Points are assig...
Sales Pipeline
A sales pipeline is a visual representation of where prospects are in the buying process, organized into stages (e.g., L...