top of page

Domain name

A domain name (NDD in French shorthand or DN to Domain Name in English) is in the domain name system, an identifier of internet domain. A domain is a set of computers connected to the Internet and having a common characteristic. For example, a domain such as .com is the set of computers that host activities for individuals or organizations that are registered with the AFNIC is in charge of the registry .com top-level domain; in general, these individuals or companies have a certain relationship (which may be tenuous in some cases) with France; paris.fr the domain is the set of computers that host activities for the city of Paris.

A domain name is a "mask" on an IP address. The purpose of a domain name is to remember and easily communicate the address of a set of servers (website, email, FTP). For example, wikipedia.org is easier to remember than 208.80.154.224 or 91198174192



Status

There are no special status to operate a website. This activity may be carried by an individual but also as part of a sole proprietorship or partnership.
If it is a personal site that makes no commercial transaction which generates no revenue, a legal framework is not necessary. By cons, if sales are made through the site (goods, services, advertising space), it is then advisable to hire a business creation process.

Similarly, an individual who usually has sales on an auction site like e-Bay auction or PriceMinister and draws regular income, should start a business. There is no minimum or maximum sales threshold. It is the regularity of the business, its lucrative character and organization in place (personal page presenting the items to the auction, online store, advertising, etc.) that allow courts to decide case by case these criteria and qualify some traders dealers.



Domain Registration

In DNS, a domain name registry is a database containing information on subdomains (or second-level domain) of a top level domain such as .com, .co.uk, .ca, .org .
Also called register the organization that maintains the database mentioned in the previous paragraph. often used words Network Information Center, or NIC to designate that organization.
The registry contains a list of already reserved domain names in a top level domain and the identification of authoritative DNS servers on these areas. This is where comes the operation of all DNS servers worldwide.

 

DNS

 

The Domain Name System (DNS domain name system) is a service that translates a domain name into several types of information associated with them, including IP address of the machine with that name.


Whois server

(English contraction who is ?, meaning "who is?") Is a search service provided by the Internet registries, such as the Regional Internet Registries (RIR) or the domain name registries for obtaining information about an IP address or domain name. The information has a variety of uses, whether coordination between network engineers to solve a technical problem, or looking for the owner of a domain name by a company that would get it.



Reverse DNS

In most of the DNS (Domain Name System) research customers perform a direct search, ie a search based on the DNS name of another computer stored in a host resource (A) record. This type of query expects an IP address as the resource data for the response.

DNS also provides a reverse lookup process, in which clients use a known IP address and look for a computer name based on the address. A reverse lookup takes the form of a question such as "Can you give me the DNS name of the computer that uses the IP address 192.168.1.20? ".



Ping


Ping is the name of a computer command to test the accessibility of another machine through an IP network. The command also measures the time taken to receive a response, called round-trip time (round trip time). Ping uses ICMP Request request and waits for a reply response.




DDoS attacks

A denial-of-service attack (denial of Service attack, hence the abbreviation DoS) is a computer attack aimed to make available a service to prevent legitimate users of a service from using it. It may be:

 - looding a network to prevent its operation;

 - disruption of connections between two machines, preventing access to a particular service;

 - obstructing access service to a particular person;

 - Also the fact of sending billions of bytes to an internet box.

The denial of service attack and can block a file server, make access to a web server or prevent email distribution in a company.


The attacker hacker does not necessarily need sophisticated equipment. Thus, some DoS attacks can be performed with limited resources against a much larger and modern network. sometimes called such attacks "asymmetric attack" (because of the difference in resources between the protagonists). A hacker with outdated computer and a slow modem can thus neutralize machines or much larger networks.

SSL

SSL (Secure Socket Layer) / TLS (Transport Layer Security) is the most common security protocol that creates a secure channel between two communicating machines on the Internet or an internal network. In our society centered on a vulnerable Internet, SSL is generally used when a browser must connect securely to a web server


Technically, SSL is a transparent protocol that requires little interaction from the end user. For browsers, for example, users are warned of the presence of SSL security by displaying a padlock and protocol "https" in the url, and, in the case of SSL Extended Validation by the green address bar. The key to success therefore SSL is its incredible simplicity for the end user.

The EV SSL certificate (such as GlobalSign ExtendedSSL) displays easy to interpret visual indicators:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Unlike the "http" insecure that uses port 80 by default, the "https" secure uses port 443.

"Http" is vulnerable to attack by malicious individuals or organizations trying to access any kind of personal information such as banking information and login information. Ensure that such information is sent through the protocol "https" is to ensure that these will be encrypted and protected.


Website Monitoring

The website monitoring and website monitoring consists in checking the availability and navigability of a website. The interest is to know the conditions of access and navigation of the Internet, monitoring is usually external, is achieved through control points (or probes) scattered around the world.
When an error is detected (unavailability, excessive load times, non-resolution of domain name, etc.), against-measurement is performed by one or more other control points. If the error is confirmed, an alert is sent to the webmaster (SMS, email, instant messaging). The error thresholds and alerts are often customizable by the customer.

All data collected during each audit is used to establish test reports, which thus have valuable statistical data, frequently used to optimize the structure of a site. These reports are issued at variable frequencies: hourly, daily, weekly, monthly and / or yearly. availability rate also states



URL

The URL (Uniform Resource Locator) is the address of the website or page on the internet.
It consists of five elements: protocol + server + directory + file extension

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Some details on the elements of a site (server name):

 - Www = On is on the World Wide Web
 - Inhes.interieur.gouv = This is the domain name. Here we are on a corporate website: Ministry of Interior and the French in particular on the service INHES.
 - En = suffix which gives an indication of the country of origin this is the France.Dans other cases, the suffix may give an indication of the nature of the site, the type of organization (commercial, associative , institutional.). org for example means non-commercial organization or its opposite .com


blasting

The mining is the process of using the computing power to process transactions, secure the network and allow all users of the system to stay in sync. This can be seen as the Bitcoin data center, except that it has been designed to be fully decentralized with minor operating in every country and no individual controls the network. The name "mining" is used in analogy to the mining of gold because it is also a temporary mechanism to issue new bitcoins. However, unlike gold, the mining of bitcoins in exchange offer a reward for useful and necessary service to operate a secure payment network. The mining will always be needed even after the issuance of the last bitcoin.

Glossary

© 2023 by Digital Marketing. Proudly created with Wix.com

Formulaire de contact

  • Facebook Social Icon
  • Twitter Social Icon
  • Tumblr Social Icon
  • Pinterest Social Icon
  • LinkedIn Social Icon
  • Google+ Social Icon

Message réceptionné !

bottom of page