TS tech-sensei.com
Pillar 1 - Free Reference

Tech Glossary explained for humans.

73+ tech and AI terms defined in 1-2 sentences. No jargon-on-jargon definitions. If a definition isn't clear, email us at hi@tech-sensei.com.

A

2FA (Two-Factor Authentication)
Login requires two separate pieces of evidence: something you know (password) + something you have (phone code, hardware key). Stops 99% of automated account takeovers.
Affiliate link
A URL that includes a tracking parameter, so the merchant knows the visitor came from a specific site. Site earns commission on sale; visitor pays the same price.
AI agent
An AI program that can take multi-step actions (browse, write, code) toward a goal, not just answer questions. As of 2026: capable but unreliable for high-stakes tasks.
AI Overview
Google's AI-generated answer at the top of search results. Replaces some traditional blue links. Big impact on traffic for content sites.
Antivirus
Software that scans files and processes for malicious code patterns. In 2026 less critical than 10 years ago (Windows Defender is solid), still useful for vulnerable users.
API (Application Programming Interface)
The contract by which one program talks to another. When you connect Zapier to Slack, you're using an API.

B

Backup
A copy of your data stored separately from the original. Rule 3-2-1: 3 copies, 2 different media, 1 off-site.
Bandwidth
The maximum data transfer rate of an internet connection (e.g., 100 Mbps = 100 million bits per second). Higher = faster downloads.
Brute force attack
An attacker tries every possible password combination until one works. Defeated by strong passwords (entropy) and account lockouts.

C

CAPTCHA
"Completely Automated Public Turing test to tell Computers and Humans Apart". The annoying click-the-buses test.
Captcha bypass
AI tools now solve CAPTCHAs faster than humans. This is reshaping the bot-vs-human web war.
Cloud storage
File storage hosted on remote servers (Dropbox, iCloud, Google Drive, Proton Drive). Convenient but you trust the provider.
Cookies
Small data files stored by your browser. Functional cookies (login session) are necessary; tracking cookies (advertising) are the privacy concern.
Cryptocurrency
Digital currency secured by cryptography. Bitcoin, Ethereum are the major ones. Beyond Tech Sensei scope mostly.
Cyber hygiene
Routine practices that keep your digital life safe: update software, use strong passwords, enable 2FA, recognize phishing.

D

Data breach
An incident where private data is exposed to unauthorized parties. Check yourself at haveibeenpwned.com.
DNS (Domain Name System)
The phonebook of the internet: translates "google.com" into "142.250.190.78". Cloudflare 1.1.1.1 is a fast privacy-friendly DNS.
DDoS (Distributed Denial of Service)
An attack that floods a server with traffic from thousands of devices, taking the service offline. Affects merchants, not usually end users.
Dark mode
Inverted color scheme for screens (dark background, light text). Reduces eye strain at night, may save battery on OLED screens.

E

E2EE (End-to-End Encryption)
Messages encrypted on sender device, decrypted only on recipient device. Server in middle sees only encrypted blob. Signal, ProtonMail do this; Gmail doesn't.
Encryption
Mathematical scrambling of data so only those with the key can read it. AES-256 is the current consumer standard.
Ethernet
Wired network connection (vs Wi-Fi). Faster and more reliable for fixed devices.
Exploit
A specific technique to abuse a software vulnerability. Patched by software updates.

F

Firewall
Software or hardware that blocks unauthorized network traffic. Built into Windows and macOS by default; mostly invisible to end users.
Firmware
Software embedded in hardware devices (router, smart bulb, USB drive). Should be updated when manufacturer releases patches.
Phishing
Fraudulent attempt to obtain credentials by impersonating trusted entity (bank, IT department) via email or message. 90%+ of breaches start with phishing.

G

GDPR (General Data Protection Regulation)
EU privacy law (2018) giving users rights over their data. Applies to any company processing EU citizen data.
GPU (Graphics Processing Unit)
Specialized processor for graphics, also used for AI training. NVIDIA dominates this market.

H

Hardware key
Physical 2FA device (YubiKey, Google Titan). Strongest form of 2FA, immune to phishing.
HTTPS
Encrypted HTTP. Padlock in address bar = HTTPS = traffic encrypted between your browser and the server. Essential for any login.
Hash
One-way mathematical function: given input, produces fixed-length output that can't be reversed. How passwords are stored properly.

I

IDS (Intrusion Detection System)
Monitors network for suspicious patterns. Built into enterprise networks; rarely needed for consumer setups.
IoT (Internet of Things)
Network-connected physical devices: smart bulbs, thermostats, cameras, door locks. Massive attack surface if not secured.
IP address
Numeric identifier of a device on a network. IPv4 (192.168.1.1) running out; IPv6 (2001:db8::1) is the future.

L

LLM (Large Language Model)
AI model trained on massive text corpus to predict next tokens. ChatGPT, Claude, Gemini are LLM-based chatbots. Not "AI" in sci-fi sense.
Local-first
Software architecture where data lives primarily on user's device, not cloud servers. Obsidian, Logseq follow this.

M

Malware
Umbrella term for malicious software: viruses, ransomware, spyware, trojans, worms.
Matter
Smart home standard (2022+) that lets devices from different vendors work together. Aqara, Eve, Apple, Google all support Matter.
MFA (Multi-Factor Authentication)
Same as 2FA but more factors possible: knowledge + possession + biometric + location.
Mesh Wi-Fi
Multi-node Wi-Fi system that creates a single network covering large homes. Eero, Asus AX, Google Nest Wifi are examples.

N

NAS (Network Attached Storage)
A small home server for storage + media + backups. Synology and QNAP are the popular brands.
Network neutrality
Principle that ISPs should treat all internet traffic equally. Politically contested in different countries.
No-logs policy
A VPN provider's promise not to record user activity. Verified by external audits (PwC, Deloitte) for major VPNs.

O

Open source
Software with publicly accessible source code. Allows security audits, modifications, self-hosting.
OS (Operating System)
Foundation software: Windows, macOS, Linux, iOS, Android.
OTP (One-Time Password)
Single-use code, often time-based (TOTP). What Google Authenticator generates.

P

Password manager
Encrypted vault for storing unique passwords. Generates strong passwords, autofills logins. Bitwarden, 1Password, KeePassXC.
Passkey
Modern replacement for passwords. Uses public-key cryptography + biometric unlock. iOS 16+, Android, modern browsers support.
Patch
Software update that fixes a vulnerability or bug. "Patch Tuesday" = Microsoft's monthly update cycle.
PII (Personally Identifiable Information)
Data that identifies a person: name, email, SSN, biometrics. Heavily regulated under GDPR + CCPA.
Privacy policy
Legal document explaining what data a service collects and how it uses it. Usually too long; should be reviewed for sensitive services.

R

Ransomware
Malware that encrypts your files and demands payment for decryption key. Backups are the only reliable defense.
RAT (Remote Access Trojan)
Malware that gives attacker remote control of your device. Often delivered via phishing.
Router
Device that connects your home network to the internet. Quality varies; ISP-provided routers are often weak.

S

Scam
Fraudulent scheme to extract money or data. In tech: fake invoices, fake support calls, romance scams.
Self-hosting
Running services on your own hardware (Synology, Raspberry Pi). Privacy benefit, complexity cost.
SIM swap
Attacker convinces phone carrier to transfer your phone number to their SIM. Bypasses SMS-based 2FA. Use app-based 2FA instead.
Smart home
Network of connected home devices: lights, locks, thermostats, speakers, cameras.
Smishing
Phishing via SMS. Often impersonates banks or shipping companies.
Spyware
Software that secretly observes user behavior. Includes stalkerware (intimate partner abuse) and commercial tracking.
SSL/TLS
Cryptographic protocols underlying HTTPS. TLS 1.3 is current standard.
SSO (Single Sign-On)
"Login with Google" / "Login with Apple". One credential unlocks many services. Convenience + centralized risk.

T

Thread
Smart home networking protocol (radio). Used by Matter alongside Wi-Fi and Bluetooth.
TOTP (Time-based One-Time Password)
2FA codes that rotate every 30 seconds. Authy, Google Authenticator, 1Password TOTP.
Tor
Anonymity network that routes traffic through multiple servers. Used by journalists, activists, criminals. Not the same as a VPN.
TPM (Trusted Platform Module)
Hardware security chip in modern computers. Stores cryptographic keys safely.

U

USB Restricted Mode
iOS feature that disables USB data connection after 1 hour of being locked. Defeats police-grade forensic tools.

V

VPN (Virtual Private Network)
Encrypts your internet traffic between your device and a VPN server. Hides traffic from ISP and public Wi-Fi snoops.
Vulnerability
A flaw in software that can be exploited. Discovered by security researchers, patched by vendors.

W

WireGuard
Modern fast VPN protocol. Replaced OpenVPN as the default for most VPN apps.
Wi-Fi 6 / 7
Current and next Wi-Fi standards. Wi-Fi 6 (AX, 2019) common in 2026; Wi-Fi 7 (BE, 2024) cutting-edge.

Z

Zero-day
A vulnerability that attackers know about before the vendor does (or before a patch exists). Most serious type of vulnerability.
Zero-knowledge
Architecture where the service can't access user data even if it wanted to. ProtonMail, Bitwarden, Signal use this.
Suggest

Missing a term?

Email hi@tech-sensei.com with the term you'd like defined. We add the most-requested ones monthly.