Welcome ! HomeHostStore Home
Support Center Home
Reference Center
• FAQ's
• User Guides
• Tutorials
• Downloads
• Web Glossary
• Useful Links
Support Tickets
• Create New Ticket
• Existing Ticket Status
• Control Panel Login
• Announcements
• Server Status
• Acceptable Use Policy
• Privacy Policy
Web Glossary
Here you will find descriptions of the most popular computer or internet terminologies.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

[R]
RAID5
RAID is a way of storing the same data in different places by placing data on multiple hard disks. By placing data on multiple disks operations can overlap in a balanced way, improving performance.
Back to top
RAM - Random-Access Memory
Hardware inside your computer that retains memory on a short-term basis. This information is stored temporarily while you're working on it. RAM comes in several different forms.
Back to top
RealAudio
RealNetworks' (formerly Progressive Networks) RealAudio client-server software system enables Internet and online users equipped with conventional multimedia personal computers and voice-grade telephone lines to browse, select and play back audio or audio-based multimedia content on demand, in real time. This is a real breakthrough compared to typical download times encountered with delivery of audio over conventional online methods with which audio is downloaded at a rate that is five times longer than the actual program.
Back to top
RealMedia
A term encompassing RealNetworks' RealAudio and RealVideo
Back to top
Realtime Blackhole List (RBL)
Realtime Blackhole List (RBL) is a list of IP addresses whose owners refuse to stop sending spam. The RBL usually lists server IP addresses from ISPs whose customers are responsible for the spam, or from ISPs whose servers are hijacked for spam relay. Companies who subscribe to the RBL will know from which IP addresses to block traffic. Most traffic blocking occurs during the SMTP connection phase. The receiving end will check the RBL for the connecting IP address. If the IP address matches one on the list, then the connection gets dropped before accepting any traffic from the spammer. Some ISPs, though, will choose to blackhole (or ignore) IP packets at their routers. The goal here is to block all IP traffic. The RBL was created by Mail Abuse Prevention System (MAPS) LLC., but there are other entities that keep RBLs besides MAPS. We use lists such as, but not limited to, SpamHaus and SpamCop in the CatchGuard feature offered with some of our mail packages.
Back to top
RealVideo
A streaming technology developed by RealNetworks (formerly Progressive Networks) for transmitting live video over the Internet. RealVideo uses a variety of data compression techniques and works with both normal IP connections as well as IP Multicast connections.
Back to top
Remember My Login
If you select this option you will not be prompted for your username and password when entering the site. This maynot be secure if you are using a public or shared computer. Your computer must be set to accept cookies to use this feature.
Back to top
Remote Terminal
It is possible to log in to a remote computer by using an application program based on TELNET - a terminal emulation protocol made for this purpose. The user can therefore enter commands on a keyboard attached to their local computer and access files, etc., on a remote computer that may be located anywhere in the world.
Back to top
Requests for Comments (RFC) document series
The Requests for Comments (RFC) document series is a set of technical and organizational notes about the Internet (originally the ARPANET), starting in 1969. Memos in the RFC series discuss many aspects of computer networking, including protocols, procedures, programs, and concepts. The official specification documents of the Internet Protocol suite that are defined by the Internet Engineering Task Force (IETF) and the Internet Engineering Steering Group (IESG ) are recorded and published as standards track RFCs. As a result, the RFC publication process plays an important role in the Internet standards process. Our company uses these standards to make its engineering decisions, including all rules and settings on our servers.
Back to top
Router
Hardware (or software) that connects a local network to the Internet. Routers look at the destination addresses of the packets passing through them and decide which route to send them on.
Back to top
Copyright © 2002-2011 hostsore.net All Rights Reserved
All Graphic & Image Rights Reserved by Their Respective Company