Terms Letter: R
Redundant arrays of independent disks. A disk system with RAID capability can protect its data and provide on-line, immediate access to its data, despite a single (some RAID storage systems can withstand two concurrent disk failures) disk failure.
Raw logs contain the records for all hits to your site. Each web server has its own log format. You can download the raw logs for your web hosting account and analyze them with a software of your choice.
RBL or DNSBL
Stands for Real-time BlackHole List. Usually used to identify networks and/or IP addresses of servers that relay spam or are vulnerable/open relay. Many web hosting providers use RBL lists as part of their anti-spam protection.
In context of web hosting it is usally a smaller starter company that that resells hosting services of a parent bigger web hosting company.
A standard connector, the type of modular jack used with telephones.
Standard 8-wire connectors for networks. Also used as phone lines in some cases.
A system responsible for making decisions about which of several paths network traffic will take, and for keeping track of routing information which is being passed along a network be one of several different possible protocols.
(Rivest-Shamir-Adleman) RSA is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. The RSA algorithm is the most commonly used encryption and authentication algorithm and is included as part of the Web browser from Netscape and Microsoft. It’s also part of Lotus Notes, Intuit’s Quicken, and many other products. The encryption system is owned by RSA Security.
Relatively new web programming language. It is object oriented. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, extensible, and portable. You can find more about ruby at http://www.ruby-lang.org