Knowledge Base
Help  > Glossary

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 

Accessibility - The art of ensuring that, to as large extent as possible, facilities (such as, for example, Web access) are available to people whether or not they have impairments of one sort or another.

AJAX (Asynchronous JavaScript and XML) - AJAX stands for Asynchronous JavaScript and XML. It is a web development technique used for creating interactive web applications. The idea is to make web pages more responsive by exchanging small amounts of data with the server behind the web application so that the entire web page does not have to reload each time the user requests a change.

Alert - An automated method to send a person, group of people, IT staff members or another system a warning that a web site, network component or web application has failed.

Alphanumeric - Consisting of English language letters, digits, or both, and occasionally containing control characters or other special characters.

API (Application Programming Interface) - API stands for Application Programming Interface and is a source code interface that a computer system provides in order to support requests for services.

ASCII - American Standard Code for Information Interchange. Files including ASCII contain standard keyboard characters but no formatting information.

Availability - The ability of a network component, web service or web application to perform its required functions at any time when needed.

Backbone Network - A high-speed network, which is at the top level of a hierarchical computer network forming a major pathway within the network. It provides connectivity between lower-level networks and nodes in the hierarchy.

Browser - A program which allows a person to read hypertext . The browser gives the means of viewing the contents of nodes and of navigating from one node to another.

Connect Time - The time it takes a client browser or WebSitePulse monitoring agent to connect to a web server across the Internet

Content Match - The ability of the WebSitePulse system to verify if a specific string of characters appears in the source code of an HTML web page. An alert can be sent in the event of a positive or negative match

Content Time - Content time, also referred to as time to download the last byte, is the time in seconds that it takes a website to deliver all of its content (images, HTML, and other objects) from the web server where it resides to the client browser or the WebSitePulse agent. You can measure the content time and other components of your website with our Website Test tool.

Cookie |WebSitePulse, Web server and website monitoring service - Bits of information about a user that web servers store on the client computer for their later use. For example, web servers can use cookies to store the user's website configuration, to remember items placed in a "shopping cart" at an online shopping site, or to store account and password information for subscription sites.

CRAM-MD5 SMTP authentication - CRAM-MD5 stands for challenge-response authentication mechanism (CRAM). In CRAM-MD5 authentication, the server first sends a challenge string to the client. The client responds with a username followed by a checksum. The checksum contains the user's password as the secret key, and the server's original challenge as the message. The server also calculates its own checksum with its notion of the user's password, and if the client's checksum and the server's checksum match then authentication was successful.

Daemon - A daemon is a computer program that runs continuously in the background and exists for the purpose of handling periodic service requests that a computer system expects to receive. The daemon computer program forwards the requests to other computer programs or processes as appropriate. Every web server connected to the Internet has an HTTPD (Hyper Text Transfer Protocol Daemon) that continuously listens for requests coming in from Web clients and their users.

Defacement - A website defacement is the substitution of the original home page by a system hacker that breaks into a web server and alters the hosted website creating one of his own.

Diagnose - Performing multiple instant tests in order to identify and resolve different problems

Diagnostic Tools - Test tools designed to test instantly performance, availability, response time and other parameters of a web server, transaction or web application

DNS - Domain Name System (or Service). An Internet service that translates domain names into IP addresses.

DNS error - When a browser or the WebSitePulse monitoring agent attempts to locate the tested website or web page and is not being able to obtain the corresponding IP address

DNS Look-up - The process of querying a DNS server to lookup and resolve the requested hostname or domain name and returning the corresponding IP address. To find out more, you can try our DNS Lookup Test.

DNS Server - A server, which contains a list with certain IP addresses and hostnames and translates a hostname to its corresponding IP address. You can instantly test a DNS server with our Server Test tools.

DNS Time - The time it takes a web browser or the WebSitePulse monitoring agent to translate a hostname to its corresponding IP address

Domain name - A name (such as "") of a service, Website, or computer, and so on in a hierarchical system of delegated authority - the Domain Name System

Downtime - Represents the total time period during which a server, website, web application or web component is not operational, within its scheduled service times. It is measured in hours and minutes and also as a percentage

Email contact - The Email contacts receive alerts and reports by email. They include all regular email accounts or any other devices that can receive email like email to cellular phone, email to SMS, email to pager, etc. Alerts to the Email contacts are free.

End user - A natural person who makes use of resources for application purposes.

First Byte Time - The time it takes to receive the first byte of the page HTML, graphic object or other web component after the TCP connection is completed. You can measure the time it takes the first byte of a website to download with our Website Test tool.

FTP - The File Transfer Protocol (FTP) provides the basic elements of file sharing between hosts. FTP uses TCP to create a virtual connection for control information and then creates a separate TCP connection for data transfers. The control connection uses an image of the TELNET protocol to exchange commands and messages between hosts.

Fullpage Failed - This field shows the total number of page components which were not functioning properly at the time of the test.

Fullpage Frames - The monitoring agent is testing all the frames on the web page.

Fullpage Images - The monitoring agent is testing all the images presented on a web page, including not only the images called by tags, but also body and table background images.

Fullpage Links - The monitoring agent is testing all the links on the web page.

Fullpage Other External - The monitoring agent is testing all the forms available on the web page.

Fullpage Other Inline - The monitoring agent is checking for Flash movies, Java applets or other plugable components.

Fullpage References - This section shows the total number of references which you have selected for testing. These include the images, frames, links and other internal and external page components.

Gateway - A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within your company's network or at your local Internet service provider (ISP) are gateway nodes.

In the network for an enterprise, a computer server acting as a gateway node is often also acting as a proxy server and a firewall server. A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet.

Host name - This is the unique name of the server that is used for reaching it on a specific network. This could be a FQDN (Fully qualified domain name) for example or, or an IPv4 address like Our service now also supports IPv6. However, this option is available only for three of our monitoring locations- Chicago, Toronto and Brisbane.

HTML - A computer language for representing the contents of a page of hypertext; the language that most Web pages are currently written in.

HTTP - HyperText Transfer Protocol. The Internet protocol used to exchange HTML documents.

HTTP Request - The HTTP request message sent from the browser or the WebSitePulse monitoring agent to the server to retrieve an HTML page, graphic object or CSS file

HTTP Response - After an HTTP server listening to that port receives an HTTP request, the server sends an HTTP response containing a status line and the requested file

HTTP status codes -
100 - Continue - the client should continue with its request by sending the remainder of the request.
101 - Switching Protocols - the server will switch protocols
200 - OK - the request is successful.
201 - Created - the server created a new resource
300 - Multiple Choices - the user has to select a preference
301 - Moved Permanently - the requested resource has a new permanent URL.
302 - Found (Moved Temporarily) - the resource is temporarily moved to a different URL
304 - Not Modified - contents of the requested web page have not been modified
305 - Use Proxy - repeat the request via proxy
306 - Switch Proxy - unused
307 - Temporary Redirect - requested URL is temporarily under a different URL
400 - Bad Request - the request is not understood by the server
401 - Unauthorized - user authentication is required by the server
402 - Payment Required - code is reserved for future use
403 - Forbidden - the server refuses to respond to the request
404 - File Not Found - the server does not find the requested file
405 - Method Not Allowed - the method specified in the request is not allowed
406 - Not Acceptable - the response that can be returned to is not acceptable
407 - Proxy Authentication Required - client has to log in with a proxy server first
408 - Request Timeout - the request was not produced within the time the server is configured to wait
409 - Conflict - there is a conflict with the current state of the server
410 - Gone - the resource is no longer available at the server
411 - Length Required - content-length has to be defined
412 - Precondition Failed - a precondition is evaluated as false
413 - Request Entity Too Large - the entity is larger than the server can process
414 - Request-URL Too Long - the Request-URL is longer than the server can interpret
415 - Unsupported Media Type - the format is not supported
416 - Requested Range Not Satisfiable - request range is not satisfied
417 - Expectation Failed - the expectation in an Expect request-header can not be fulfilled by the server
500 - Internal Server Error - the server cannot fulfill the request
501 - Not Implemented - server does not support the functionality required to process the request
502 - Bad Gateway - server received an invalid response from the upstream server
503 - Service Unavailable - temporary overloading or maintenance of the server
504 - Gateway Timeout - no timely response from the upstream server
505 - HTTP Version Not Supported - the HTTP protocol version is not supported by the server

HTTPD (Hyper Text Transfer Protocol Daemon) - HTTPD stands for Hyper Text Transfer Protocol Daemon which is another name for a web server. It is a computer program which listens for and accepts HTTP requests, and serves back HTTP responses which are usually HTML pages and the resources they refer to like images, style sheets etc.

HyperText - Hypertext is text which is not constrained to be linear. Hypertext is text which contains links to other texts.

IIS - Internet Information Server. Microsoft's web server that runs on Windows NT platforms. It is tightly integrated with the Windows operating system. IIS is available only for the Windows platform.

Information space - The abstract concept of everything accessible using networks: the Web.

Instant Messenger Contact - The Instant Messenger contacts may receive alerts in the form of an instant message at their favorite messaging software. Currently we support Yahoo! IM, MSN, ICQ, Jabber, Gtalk and Skype. These contacts cannot be configured to receive the reports. Alerts to the Instant Messenger contacts are free.

Internet - A global network of networks through which computers communicate by sending information in packets. Each network consists of computers connected by cables or wireless links.

Intranet - A part of the Internet or part of the Web used internally within a company or organization. A local network.

Intrusion Detection Systems - ID stands for Intrusion Detection, which is the art of detecting inappropriate, incorrect, or anomalous activity. ID systems that operate on a host to detect malicious activity on that host are called host-based ID systems, and ID systems that operate on network data flows are called network-based ID systems.

Sometimes, a distinction is made between misuse and intrusion detection. The term intrusion is used to describe attacks from the outside; whereas, misuse is used to describe an attack that originates from the internal network. However, most people don't draw such distinctions.

The most common approaches to ID are statistical anomaly detection and pattern-matching detection.

IP (Internet Protocol) - The protocol that governs how computers send packets across the Internet.

IPR (Intellectual Property Rights) - The conditions under which the information created by one party may be appreciated by another party.

ISP - Internet Service Provider. A company that provides access to the Internet. In addition to serving individuals, ISPs also serve large companies, providing a direct connection from the company's networks to the Internet. Some users have a cable or some sort of wireless link to their ISP. For others, their computer may dial an ISP by phone and send and receive Internet packets over the phone line; the ISP then forwards the packets over the Internet.

Java - A programming language developed by Sun Microsystems. Designed for portability and usability embedded in small devices, Java took off as a language for small applications ("applets") that ran within a Web browser.

Kerberos - Kerberos is a network authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography.

Latency - The time delay of data traffic through a network or switch.

Link - A reference from one document to another (external link), or from one location in the same document to another (internal link), that can be followed efficiently using a computer. The unit of connection in hypertext.

Monitoring Agent - In WebSitePulse, Agent refers to the WebSitePulse Remote Monitoring Agent which initiates and performs the tests on your e-business components from multiple locations on the Internet.

MS SQL - Microsoft SQL Server is a relational database management system (RDBMS) produced by Microsoft.

MX record - An MX record (Mail exchanger record) is a type of resource record in the Domain Name System (DNS) specifying how Internet e-mail for a spcific email address should be routed. MX records point to the servers that should receive the e-mail, and their priority relative to each other for that email address. You can instantly check an MX record using our MX Lookup tool.

MySQL - MySQL is a popular open-source database often used for web development.

Navigation - The process of moving from one node to another through the hypertext web . This is normally done by following links . Various features of a particular browser may make this easier. These include keeping a history of where the user has been, and drawing diagrams of links between nearby nodes.

Net - Short for Internet.

New Host - The new host name should be added only by entering the domain name or the IP address of the server (e.g., without protocol name (http://, https://, etc.).

NNTP (Network News Transfer Protocol) - A protocol that defines how news articles are passed around between computers. Each computer passes an article to any of its neighbors that have not yet got it.

NS record - An NS record (Name Servers record) specifies the Name Servers responsible for a specific domain name records.

NTLM Authentication - A Microsoft authentication protocol used by servers running the Windows operation system

Numeric Pagers Contacts - The Numeric Pagers receive alerts in numeric codes, each code representing specific error. There are default codes, which you can modify at any time. Every alert to these contacts is charged at the current rate, billed to your monthly invoice. This notification service is currently available for the US, Canada and UK numeric pager numbers.

The Numeric Pagers cannot receive reports by email.

Open source - Software whose source code is freely distributed and modifiable by anyone.

Outside the Firewall - Usually refers to a monitoring process outside of an organization’s local area network.

Page Download Time - Usually refers to the time it takes a web browser or the WebSitePulse monitoring agent to download all objects and components of a specific web page.

Path - An ordered set of nodes which represent a sequence in which a web can be read. A path may represent the sequence a reader actually used, or may be a sequence recommended to the reader by the author.

Ping - Packet Internet Gropper. A utility that uses ICMP to send out echo requests, and then uses the reply packets to calculate latency between the sending and the destination hosts. To see how it works, try a Ping Test from our test tools.

Port - In TCP/IP and UDP networks, an endpoint to a logical connection. The port number identifies what type of port it is. For example, port 80 is used for HTTP traffic.

Protocol - A language and a set of rules that allow computers to interact in a well-defined way. Examples are FTP, HTTP, HTTPS and other.

Proxy - A node that relays a message between a requester and a Web service, appearing to the Web service to be the requester.

Proxy server - A server that sits between a client application (such as a web browser) and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.

Query String - A query string (or search string) is an optional part of a URL that goes after the file name and begins with a question mark (?). This part contains additional variables used by the web application - for example the url contains one parameter called "myvalue" which is equal to 1. This field should also be used to send POST data parameters when a POST method is selected.
You can enter multiple parameters separated by & or by a new line.

Redirect Time - The time it takes to follow any HTTP redirects in the HTTP servers response. The redirect time will also include the time needed to perform any DNS lookups or connection times that might occur during this process. The redirect time will be calculated only for HTTP protocol level redirects - it is not available for redirects that occur after the HTTP transaction is finished like the ones caused by META refresh tags or JavaScript functions.

Rich Internet Applications (RIA) - Rich Internet applications are web applications that have the features and functionality of traditional desktop applications. RIAs typically run in a web browser, do not require software installation and keep the bulk of the data on the application server.

RMTP - Real Time Messaging Protocol (RTMP) is a protocol developed by Adobe Systems and is used by the Flash Player to deliver real time objects, video, and audio to clients using a binary TCP connection or polling HTTP tunnel.

Router - In packet-switched networks such as the Internet, a router is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination. The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to. A router is located at any gateway (where one network meets another), including each point-of-presence on the Internet. A router is often included as part of a network switch.

RTSP (Real-Time Streaming Protocol) - The Real Time Streaming Protocol (RTSP) is developed by the IETF in 1998. It is a protocol for use in streaming media systems which allows clients to remotely control a streaming media server, issuing VCR-like commands such as "play" and "pause", recording and possibly device control, time-based access to files on a server and absolute positioning within the media stream. Most RTSP servers use the standards-based RTP as the transport protocol for the actual audio/video data.

RTSP Status Codes - This is a list of the supported RTSP status codes and their meanings

100 - Continue
200 - OK
201 - Created
250 - Low on Storage Space
300 - Multiple Choices
301 - Moved Permanently
302 - Moved Temporarily
303 - See Other
304 - Not Modified
305 - Use Proxy
400 - Bad Request
401 - Unauthorized
402 - Payment Required
403 - Forbidden
404 - Not Found
405 - Method Not Allowed
406 - Not Acceptable
407 - Proxy Authentication Required
408 - Request Time-out
410 - Gone
411 - Length Required
412 - Precondition Failed
413 - Request Entity Too Large
414 - Request-URI Too Large
415 - Unsupported Media Type
451 - Parameter Not Understood
452 - Conference Not Found
453 - Not Enough Bandwidth
454 - Session Not Found
455 - Method Not Valid in This State
456 - Header Field Not Valid for Resource
457 - Invalid Range
458 - Parameter Is Read-Only
459 - Aggregate operation not allowed
460 - Only aggregate operation allowed
461 - Unsupported transport
462 - Destination unreachable
463 - Key management Failure
500 - Internal Server Error
501 - Not Implemented
502 - Bad Gateway
503 - Service Unavailable
504 - Gateway Time-out
505 - RTSP Version not supported
551 - Option not supported

Service agreement - Contract between a service provider and a requester regarding the attributes of a Web service and its usage.

Service provider - A legal entity that provides a Web service.

SIP - The Session Initiation Protocol (SIP) is a signaling and call setup protocol for VOIP communications. It can be used to create two-party, multiparty, or multicast sessions that include Internet telephone calls, multimedia distribution, and multimedia conferences. It can also be used in any application where session initiation is a requirement like presence and events notifications, instant messaging and Internet real-time fax delivery signaling. SIP is designed to be independent of the underlying transport layer and for this reason SIP clients can use TCP or UDP (typically on port 5060) to connect to SIP servers and other SIP endpoints.

SIP Status Codes - This is a list of the known SIP status codes

100 - Trying
180 - Ringing
181 - Call Being Forwarded
182 - Call Queued
183 - Session Progress
200 - OK
202 - Accepted
300 - Multiple Choices
301 - Moved Permanently
302 - Moved Temporarily
305 - Use Proxy
380 - Alternative Service
400 - Bad Request
401 - Unauthorized
402 - Payment Required
403 - Forbidden
404 - Not Found
405 - Method Not Allowed
406 - Not Acceptable
407 - Proxy Authentication Required
408 - Request Timeout
409 - Conflict
410 - Gone
411 - Length Required
413 - Request Entity Too Large
414 - Request URI Too Long
415 - Unsupported Media Type
416 - Unsupported URI Scheme
420 - Bad Extension
421 - Extension Required
423 - Interval Too Brief
480 - Temporarily Unavailable
481 - Call/Transaction Does Not Exist
482 - Loop Detected
483 - Too Many Hops
484 - Address Incomplete
485 - Ambiguous
486 - Busy Here
487 - Request Terminated
488 - Not Acceptable Here
491 - Request Pending
493 - Undecipherable
500 - Server Internal Error
501 - Not Implemented
502 - Bad Gateway
503 - Service Unavailable
504 - Server Time-Out
505 - Version Not Supported
513 - Message Too Large
600 - Busy Everywhere
603 - Declined
604 - Does Not Exist Anywhere
606 - Not Acceptable

SMS (Short Message Service) - The Short Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. The text can comprise of words or numbers or an alphanumeric combination. SMS was created when it was incorporated into the Global System for Mobiles (GSM) digital mobile phone standard.

A single short message can be up to 160 characters of text in length using default GSM alphabet coding, 140 characters when Cyrillic character set is used and 70 characters when UCS2 international character coding is used

SMS contact - SMS (Short Message Service) is a text message that can be sent to almost any cellular phone or other wireless device in the World. This notification service is provided directly through our multiple SMS gateways. Every alert to the SMS contacts is charged an additional fee and is billed to your monthly invoice. The majority of the wireless networks are charged at US$0.10 per SMS, but some may be more or less expensive.

The SMS notification contacts cannot receive reports by email.

SMTP - Simple Mail Transfer Protocol. A protocol used to exchange mail between computers.

SNMP - Simple Network Management Protocol. A set of rules for management of networks and the monitoring of network devices and functions.

SNMP contact - A SNMP trap will be sent to the configured server. This type of contacts cannot receive reports by email. The MIB file which defines the traps sent by our monitoring agent can be downloaded from the contact configuration page or from the following URL

No aditional fees are added for receiving SNMP traps.

SOAP (Simple Object Access Protocol) - SOAP (Simple Object Access Protocol, a.k.a. Service Oriented Architecture Protocol) is a protocol for exchanging XML-based messages between applications over computer networks, normally using HTTP or HTTPS. There are several different types of messaging patterns in SOAP, but by far the most common is the Remote Procedure Call (RPC) pattern, in which one network node (the client) sends a request message to another node (the server), and the server immediately sends a response message to the client.

SPF (Sender Policy Framework) - The Sender Policy Framework (SPF) is an open standard specifying a technical method to prevent sender address forgery. It protects the envelope sender address (return-path), which is used for the delivery of messages.

SSL - Secure Sockets Layer. Both Netscape Navigator and Internet Explorer support SSL, and many web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, web pages that require an SSL connection start with "https" instead of "http." WebSitePulse supports SSL when specifying URLs for URL monitors.

TCP (Transmission Control Protocol) - IETF RFC793 ( defines the Transmission Control Protocol (TCP). TCP provides a reliable stream delivery and virtual connection service to applications through the use of sequenced acknowledgment with retransmission of packets when necessary.

Time-out - A period of time after which some condition becomes true if some event has not occurred. For example, a session that is terminated because its state has been inactive for a specified period of time is said to "time out".

TLS - The TLS (Transport Layer Security) is a security protocol that allows client/server applications to communicate securely in a way that is designed to prevent eavesdropping, tampering, or message forgery.
It is based on SSL (Secure Socket Layer) v3.0 and was first defined in January 1999. The latest version is TLSv1.2 and currently an IETF working group is working on the draft of TLSv1.3 with the following design golas
o Develop a mode that encrypts as much of the handshake as is possible to reduce the amount of observable data to both passive and active attackers.
o Develop modes to reduce handshake latency, which primarily support HTTP-based applications, aiming for one roundtrip for a full handshake and one or zero roundtrip for repeated handshakes. The aim is also to maintain current security features.
o Update record payload protection cryptographic mechanisms and algorithms to address known weaknesses in the CBC block cipher modes and to replace RC4.
o Reevaluate handshake contents, e.g.,: Is time needed in client hello? Should signature in server key exchange cover entire handshake? Are bigger randoms required? Should there be distinct cipher list for each version? Are additional mechanisms needed to prevent version rollback needed?
o The group will consider the privacy implications of TLS1.3 and where possible (balancing with other requirements) will aim to make TLS1.3 more privacy-friendly, e.g. via more consistent application traffic padding, more considered use of long term identifying values, etc.

Traceroute - Traceroute is a UNIX communication program that is used to see the route packets take to network host. This program attempts to trace the route an IP packet would follow to some internet host by launching UDP probe packets with a small ttl (time to live) then listening for an ICMP "time exceeded" reply from a gateway. It starts its probes with a ttl of one and increase by one until it gets an ICMP "port unreachable" (which means it has got to "host") or hit a max of 30 hops.

Traceroute will start its probe using UDP port number 33434. Traceroute hopes that nothing is listening on UDP ports 33434 to 33463 at the destination host (so an ICMP PORT_UNREACHABLE message will be returned to terminate the route tracing).

TTFB - Time to First Byte. See First Byte Time

UDP (User Datagram Protocol) - The User Datagram Protocol (UDP), defined by IETF RFC768 (, provides a simple, but unreliable message service for transaction-oriented services. Each UDP header carries both a source port identifier and destination port identifier, allowing high-level protocols to target specific applications and services among hosts.

Uptime - Uptime is the percentage of time that a website, server, web system or web application is working properly and servicing requests.

URL Contacts - The URL contacts will open a specific page in case of an alert event. This service can be used to reboot your server or to perform any other action that can be triggered by opening a specific web page. The WebSitePulse monitoring agent supports both HTTP and HTTPS protocols and the URL can be requested using GET or POST request methods.

The alert details are sent as a single GET or POST parameter that is appended to your URL so you can record them in your database or process them within your web application. It is recommendable to modify the alert contents for this contact so you could process the information sent by our monitoring agent more easily.

For example if you set the content of the alert that is set in connection errors to

Voice call contact - The Voice Call contacts receive alerts by a phone call. A human voice will announce the details of the error based on your customization of the alert message for each individual voice contact. Each call to these numbers is charged at the current rate, billed to your monthly invoice. This notification service is currently available for the US, Canada and UK phone numbers.

The Voice Call contacts cannot receive reports by mail.

Web - Short for World Wide Web.

Web application - Web application is an application that is accessed over the Internet or an intranet. It is usually structured as a three-tiered application. In this form, a Web browser as the first tier sends requests to the middle tier - an engine using some dynamic Web content technology (such as ASP, ASP.NET, CGI, ColdFusion, JSP/Java, PHP, etc.), which services them by making queries and updates against a database - the third tier, and generates a user interface.

Web site - A collection of interlinked Web pages, including a host page, residing at the same network location.

Web Transaction - Transaction is a sequence of URLs combined into one complete process. Typical web transactions are when a customer logs in a member website, makes a purchase on a shopping site, fills in and submits a web form and performs other interactions with a website and web application. The WebSitePulse Transaction Monitoring allows Customers to measure the experience of online users navigating through multiple steps of their websites.

Website Defacement - A website defacement is the substitution of the original home page by a system hacker that breaks into a web server and alters the hosted website creating one of his own.

WebSitePulse - A mission-critical subscription-based remote website, web server and web transaction monitoring service, providing accessibility, availability and performance monitoring with real time alert and reporting services for Internet-connected Web Systems. WebSitePulse will monitor up to every 1 minute virtually any TCP- or UDP-enabled Internet Web System, including but not limited to:

# Web Sites
# Web Servers (HTTP)
# Secure Web Servers (HTTPS)
# Domain Name Servers (DNS)
# E-mail Servers (SMTP, POP, IMAP)
# Telnet Servers (Telnet, SSH)
# Custom Servers and Applications
# Routers and Firewalls
# Website content and forms
# CGI, ASP, PHP and other Scripts
# Secure Web Page Performance
# E-business Web Transactions
Be informed! Whenever your website becomes inaccessible, returns incorrect data, displays unauthorized contents, or responds slowly to connection requests, the WebSitePulse alerts you within seconds of the event via email, Phone Call, SMS, cell phone, pager or instant messaging.

WHOIS - WHOIS is a TCP-based query/response protocol which is widely used for querying a database in order to determine the owner of a domain name, an IP address, or an autonomous system number on the Internet.

World Wide Web - a.k.a. WWW. The set of all information accessible using computers and networking.

XML - EXtensible Markup Language. A language that lets designers create their own customized tags to provide functionality not available with HTML.