Another name, an assumed name.
An alternative name for a person or group using e-mail.
Someone who is addicted to being on the internet all the time.
Someone who is addicted to playing online internet games
Someone who is obsessed with the speed of their Internet connections.
A slang term used to describe a blog that is created only to handle a business public relations crisis
A slang term used to describe a really bad blog
A slang term that describes the use of blogging to push an event or subject to mainstream news.
Dynamic Host Communication Protocol
Dynamic Host Configuration Protocol
Dynamic Header Configuration Printing
A hardware device which is posited to replace the conventional book.
An electronic version of a book.
System software that is held in read-only memory
The solid parts of a computer
Software (machine instructions) stored more-or-less permanently in a ROM, PROM, EPROM, etc
A person who knowledgeable about and talented at developing or working with computer systems, but to an excessive and often unworldly degree.
Someone who spends excessive time using a computer, often with unreasonable enthusiasm.
Individuals who gain unauthorized access to computer systems for the purpose of stealing and corrupting data.
The concept of hacking into a Web site or computer system in order to communicate a politically or socially motivated message.
The global informal network that now links a very substantial fraction of the world's computer networks.
A collection of websites
The act or process of transferring a file from one computer system to another, usually but not necessarily across a network.
A scripting language designed to add features to web pages.
The coding of messages so as to render them unintelligible to other than authorized recipients.
A programming language
Short for killer application: a virus designed to damage a computer's operating system
Short for killer application: a program which is so successful that it drives a huge demand for hardware to support it and peripheral software to interact with it
The process whereby a system administrator specifies that whenever a server load exceeds a certain number it processes no more requests for its service
A technology whereby data is transmitted to users on an ongoing basis without them explicitly asking for it
Administering a network so that the traffic across it is spread as evenly as possible across the transmission lines.
The mailing of a large number of email messages to a recipient who has annoyed others, usually carried out by a number of users.
An email containing a computer virus that infects the user's computer.