Network traffic that travels within a data center, rather than north-south traffic that moves in and out of data centers. Explain on first use in public-facing documents.
Related:
Related:
Amazon Elastic Block Store. Do not use for AWS Elastic Beanstalk. Spell out on first use.
Amazon Elastic Compute Cloud. Do not spell out.
Related:
Endpoint detection and response. Spell out on first use.
Electronic Frontier Foundation. A nonprofit digital rights advocacy group that has created tools such as Privacy Badger and HTTPS Everywhere. eff.org
Means “for example” in Latin. Always followed by a comma. i.e. means “that is to say.” Choose wisely.
Related:
An antivirus test file that is intended to be flagged as a virus (though it’s not actually malicious). Pronounced “eye-car.” Do not spell out.
Related:
Enhanced Interior Gateway Routing Protocol. A proprietary Cisco protocol.
A tool used to assess Amazon EC2 security.
An open source search engine.
Related:
If it’s a type of element, use the normal font. If it’s a named element, use the tech font, as in “a customErrors
element.”
A common strategy for attackers: start as a low-privilege user and find flaws in permissions to gain admin credentials. Also called escalation of privileges.
Related:
A concise explanation of a project. Corporate jargon; use sparingly.
Executable and Linkable Format. A file format.
Use the tech font, as in [email protected]
.
A term in parallel computing. Also called pleasingly parallel.
Related:
Can be pluralized as emojis or emoji. Emoji means “picture letter” in Japanese.
Ex: 🦊 😊 🔥
Electromagnetic pulse.
Related:
Product lines reach end-of-life when they are no longer supported.
Use tech font when writing about the names of API endpoints, e.g., “the data
endpoint.”
Related:
An online technology publication.
The scope of an engagement when it includes more than a single application, website, or network.
Related:
End-of-life. Product lines reach end-of-life when they are no longer supported. Can also stand for end of line. Spell out on first use.
Electronic protected health information. Pronounced as letters. Spell out on first use.
Related:
.epub
file
Related:
Use the normal font with quotation marks around system messages, as in “The username or password is incorrect.”
Certain characters can be “escaped” so they are interpreted differently from their standard function. The escape character is used for this purpose.
Related:
Competitive online gaming. When referring to an organization or team, use their preferred spelling as in “NRG eSports” or “International e-Sports Federation.” Pronounced like “E-sports.”
Related:
A VMware hypervisor. Pronounced as letters.
A blockchain platform.
End-user license agreement. Pronounced “you-la.” Spell out on first use.
A fictional Anonymous-style hacker collective from the TV show Elementary.
Spell out on first use.
Do not include a space between the number and unit, as in “50EB.” Do not pluralize EB.
Related:
Use the tech font for the content of Excel cells, as in =HYPERLINK
and =1+1.
Related:
To enact or run a command or application.
To interact with, as in “exercise an API.” In cybersecurity, to use as intended.
A 2014 movie about an AI named Ava who undergoes a Turing test. Also a 2004 comic book series about a superhero who can communicate with and control machines.
Related:
Related:
Describes applications or functions that are available to the public internet (not only to a private or internal network) and are therefore vulnerable to attack.
Related:
A Bishop Fox tool used to “see” which web pages in a domain may be interesting to attackers.
A tool used during security assessments.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.