Term
|
Definition
The primary partition on the hard drive that boots the OS. Windows 200/XP/Vista calls the active partition the system partition. |
|
|
Term
Advanced boot options menu |
|
Definition
A Windows 2000/XP/Vista menu that appears when you press F8 when windows starts. The menu can be used to troubleshoot problems when loading Windows 2000/XP/Vista. In Vista, the menu is called the Advanced Boot Options menu. |
|
|
Term
|
Definition
User accounts that have not been authenticated on a computer. |
|
|
Term
|
Definition
A text file that contains information that WQindows requires in order to do an unattended installation. |
|
|
Term
|
Definition
Automatic Private IP Address - An IP address in the address range 169.254.x.y used by a computer when it cannot successfully lease an IP address from a DHCP server. |
|
|
Term
|
Definition
Address Resolution Protocol Command- displays, adds and removes ARP information from network devices. |
|
|
Term
Authenticated Users Group |
|
Definition
All user accounts that have been authenticated to access the system except the guest account. |
|
|
Term
|
Definition
The process of proving an individual is who they say they are before they are allowed access to a computer, file, folder, or network. The process might use a password, PIN, smart card, or biometric data. |
|
|
Term
|
Definition
Controlling what an individual can or cannot do with resources on a computer network. Using windows, authoriaztion is granted by the rights assigned to user accounts and permissions assigned to computer resources. |
|
|
Term
Automated System Recovery (ASR) |
|
Definition
The windows XP process that allows you to restore an entire hard drive volume or logical drive to its state at the time the backup of the volume was made. |
|
|
Term
|
Definition
A hidden way to allow malware to reach the system in secret even after the malware has been removed. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Directory, displays everything in the directory |
|
|
Term
|
Definition
|
|
Term
|
Definition
An entity that issues digital certificates. The digital certificate certifies the ownership of a public key by the named subject of the certificate. |
|
|
Term
|
Definition
A Windows utility that seraches for bad sectors on a volume and recovers data from them if possible. |
|
|
Term
|
Definition
Displays or alters the encryption of directories on NTFS partitions. |
|
|
Term
|
Definition
A control panel applet that allows the user to view hardware attached to the computer. |
|
|
Term
|
Definition
Dynamic Host Configuration Protcol - A Protocol used by a server to asssign dynamic IP addresses to computers on a network when they first access the network. |
|
|
Term
|
Definition
A code used to authenticate the source of a file or document or to identify and authenticate a person or orginization sending data over a network. The code is assigned by a certificate authority such as VeriSign and includes public key for encryption. |
|
|
Term
|
Definition
A limit placed on the amount of disk space that is available to users. Requires a Windows NTFS volume. |
|
|
Term
|
Definition
Domane Name System or Domain Name Service
A distributed pool of information (called the space) that keeps track of assigned host names and domain names and their corresponding IP addresses, and the system that allows a host to locate information in their pool. |
|
|
Term
|
Definition
A pssword stored on a hard drive. You must enter the password at startup before you can access data on the drive. The password is setup using BIOS setup screen. |
|
|
Term
|
Definition
The process of rolling back the driver updates in order to trouble shoot a problem or allow a program to run. |
|
|
Term
|
Definition
An assigned IP address that is used for the current session only. When the session is terminated, the IP address is returned to the list of available addresses. |
|
|
Term
|
Definition
A volume type used with dynamic disks by which you can create a single volume that uses space on multiple hard drives. |
|
|
Term
|
Definition
A tool that allows you to find out what permissions someone has on an object. |
|
|
Term
|
Definition
A Windows tool useful for troubleshooting problems with Windows, applications, and hardware. It displays logs of significant events such as a hardware or network failure, OS failure, OS error messages, a device or service that has failed to start, or General Protection Faults. |
|
|
Term
|
Definition
In Windows, the Authenticated Users group as well as the guest account. When you share a file or folder on the network, windows, by default, gives access to the everyone group. |
|
|
Term
|
Definition
Takes a compressed Windows file and expands it to its original format. |
|
|
Term
File Signature Verification |
|
Definition
A Windows tool that displays information about digitally signed files including device driver files and application files, and logs information to C:\Windows\Sigverif.txt. |
|
|
Term
|
Definition
aka Forward DNS Lookup - using an Internet Domain name to find an IP address. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Aka Recovery Partition - Usually set up when computer is first used, used to restore a computer to how it was intially setup. |
|
|
Term
|
Definition
Interment Message Access Protocol version 4
Version 4 of the IMAP protocol, which is an e-mail protocol used to download incoming email and has more functionality than its predecessor, POP. IMAP can archive messages in folders on the email server and can allow the user to chose not to download attachments. |
|
|
Term
|
Definition
Permissions assigned by windows that are attained from a parent object. |
|
|
Term
|
Definition
A 32-bit address consisting of four numbers seperated by periods, used to uniquesly identify a device on a network that uses TCP/IP protocols. The first numbers identify the network; the last numbers identify a host.
Ex: 206.96.103.114 |
|
|
Term
|
Definition
Displays all TCP/IP configuration values and refreshes DHCP and DNS settings. |
|
|
Term
|
Definition
A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies on your local computer. |
|
|
Term
|
Definition
A type of malicious software that is dormant code added to software and triggered at a predetermined time or by a predetermined event. |
|
|
Term
|
Definition
Media Access Control Address
(physical address)
A 48bit hardware address unique to each NIC card or onboard network controller and assigned by the manufacturer. The address is often printed on the adapter as Hexadecimal numbersl.
Example: 00 00 0C 08 2F 35 |
|
|
Term
|
Definition
A small sequence of commands, contained within a document, that can be automatically executed when the document is loaded or executed later by using a predetermined keystroke. |
|
|
Term
|
Definition
A volume that can be accessed by way of a folder on another volume which effectively increases the size of the folder to the size of the other volume. |
|
|
Term
|
Definition
Network Address Translation
A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the Internet. |
|
|
Term
|
Definition
A service to lookup information in the DNS. |
|
|
Term
|
Definition
When Windows passes permissions from parent objects to child objects. |
|
|
Term
|
Definition
1) A type of identity theft where a person is baited into giving personal data to a Website that appears to be the website of a reputable company with which the person has an account.
2) Sending an email message with the intent of getting the user to reveal private information that can be used for identify theft. |
|
|
Term
|
Definition
Post Office Protocol
Application layer internet standard protocol used by local email clients to retrieve email from a remote server over a TCP/IP connection. |
|
|
Term
|
Definition
A port is identified for each address and protocol by a 16bit number |
|
|
Term
|
Definition
The level of protection that Vista uses for Windows Firewall when it recognizes the computer is connected to a private network that is not part of a domain. This level offers moderate protection. |
|
|
Term
|
Definition
An encryption technology that uses a public key and private key. The public key must be shared with others so they can use it to encrypt data that you can later decrypt by using your private key. |
|
|
Term
|
Definition
The level of protcetion that Vista uses for Windows Firewall when it recognizes the computer is connected to an unsecured network. This level of protection is higher than that offered by the private profile and domain profile. |
|
|
Term
|
Definition
A partition that is usually established upon startup and used to recover the system to that point. |
|
|
Term
|
Definition
To find the host name when you know a computer's IP address. The nslookup command can perform a reverse lookup. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A type of malicious software that loads itself before the OS boot is complete and can hijack internal Windows components so that it masks information Windows provides to user-mode utilities such as Windows Explorer or Task Manager. |
|
|
Term
|
Definition
A program that runs in the background to support or serve Windows or an application |
|
|
Term
|
Definition
Allowing access to folders to remote users on the network, including assinging varying degrees of access to specific user accounts and user groups. |
|
|
Term
|
Definition
Sharing folders or files with remote network users where you have no control over who has access to the shared folder or file. |
|
|
Term
Simple Volume - Baisic Volume |
|
Definition
A type of dynamic volume used on a single hard drive that corresponds to a primary partition on a baisic disk. |
|
|
Term
|
Definition
Simple Mail Transfer Protocol
The protocol used by email clients and servers to send email messages over the internet. |
|
|
Term
|
Definition
The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer. |
|
|
Term
|
Definition
Junk email you don't ask for, don't want, and gets in the way. |
|
|
Term
|
Definition
An IP address permanently assigned to a workstation. |
|
|
Term
|
Definition
A group of four numbers (dotted decimal numbers) that tell TCP/IP if a remote computer is on the same or a different network. |
|
|
Term
|
Definition
The active partition of the hard drive containing the boot record and the specific files required to load Windows 2000/XP/Vista |
|
|
Term
|
Definition
A Windows XP/Vista utility used to restore the system to a restore point |
|
|
Term
|
Definition
Ends one or more tasks or processes. Processes can be killed using process ID or image ID. |
|
|
Term
|
Definition
Trusted Platform Module (chip)
A chip on a motherboard that holds an encryption key required at startup to access encrypted data on the hard drive. Vista BitLocker Encryption can use the TPM chip. |
|
|
Term
|
Definition
A type of infestation that hides or disguises itself as a useful program, yet is designed to cause damage when executed. |
|
|
Term
|
Definition
A Windows installation that is done by storing the answers to installation questions in a text file or script that Windows calls an answer file so that the answers do not have to be typed in during installation. |
|
|
Term
UAC - User Account Control |
|
Definition
A Vista security feature that displays a dialog box each time a user attempts to perform an action that can be done only with administrative privileges. |
|
|
Term
VPN - Virtual Private Network |
|
Definition
A Security technique that uses encrypted data packets between a private network and a computer somewhere on the internet. |
|
|