Term
Application Compatibility Toolkit (ACT) |
|
Definition
A collection of programs that enables administrators to gather information about incompatibilities between specific applications and Windows 7, and create customized solutions that enable those applications to run. |
|
|
Term
application control policies |
|
Definition
A new Windows 7 (and Windows Server 2008 R2) feature that is updates the concept implemented in software restriction policies. AppLocker also uses rules, which administrators must manage, but the process of creating the rules is much easier, thanks to a wizard-based interface. Also known as AppLocker. |
|
|
Term
|
Definition
A new Windows 7 (and Windows Server 2008 R2) feature that is updates the concept implemented in software restriction policies. AppLocker also uses rules, which administrators must manage, but the process of creating the rules is much easier, thanks to a wizard-based interface. Also known as application control policies. |
|
|
Term
|
Definition
A trusted service, whether software or commercial, that issues digital certificates to other entities. |
|
|
Term
|
Definition
A software component that sits between an application and the operating system. The fix translates the function calls that the application makes to the operating system so that the application receives the same responses it would get from an earlier operating system version. Also known as a shim. |
|
|
Term
|
Definition
A collection of compatibility fixes. |
|
|
Term
|
Definition
A feature in Internet Explorer 8 that enables the browser to properly display web pages designed to older standards. |
|
|
Term
|
Definition
A feature in Internet Explorer 8 that enables users to browse the Internet without leaving behind a history of their activities. |
|
|
Term
|
Definition
An information theft technique that uses convincing-looking Web sites to urge users to supply personal information, such as passwords and account numbers. |
|
|
Term
Program Compatibility Troubleshooter |
|
Definition
A wizard-based solution that users or administrators can use to automatically configure an executable file to use an appropriate Windows 7 compatibility mechanism. |
|
|
Term
|
Definition
An operational state that is designed to prevent attackers that do penetrate the computers defenses from accessing vital system components. |
|
|
Term
public key infrastructure (PKI) |
|
Definition
A secure communication method that requires two encryptions keysa public one and a private one. Data encrypted using the public key can only be decrypted with the private key, and in the same way, data encrypted with the private key can only be encrypted using the public key. |
|
|
Term
|
Definition
?A means of pushing frequently changing content to Internet subscribers. News sites and blogs typically maintain text-based feeds, but it is also possible for an RSS feed to push images, audio, or video content to users. |
|
|
Term
Secure Sockets Layer (SSL) |
|
Definition
A certificate-based security protocol that most computers use when transmitting encrypted data over the Internet. |
|
|
Term
|
Definition
A feature of Internet Explorer that divides the addresses accessible with the web browser into different security zones, each of which has a different set of privileges. |
|
|
Term
|
Definition
A software component that sits between an application and the operating system. The fix translates the function calls that the application makes to the operating system so that the application receives the same responses it would get from an earlier operating system version. Also known as a compatibility fix. |
|
|
Term
|
Definition
A feature in Internet Explorer 8 that examines traffic for evidence of phishing activity and displays a warning to the user if it finds any. It is up to the user to recognize the warning signs and to refrain from supplying confidential information to unknown parties. |
|
|
Term
|
Definition
An information theft technique in which an attacker convinces people to disclose secret information. Many attackers have realized that discovering a users password by calling the user and asking for it is the simplest method for gaining access to their network. |
|
|
Term
software restriction policies |
|
Definition
Group policy settings that enable administrators to specify the programs that are allowed to run on workstations by creating rules of various types. |
|
|
Term
|
Definition
A free download that enables a computer running Windows 7 Professional, Enterprise, or Ultimate edition to create a virtual Windows XP machine on which you can run any native Windows XP application. |
|
|