An SMB type of connection protocol that enables Unix, Linux, and Microsoft clients to access resources on a network.
A fiber-optic type of connector similar to a common audio or video plug. These are used most often with multimode fiber installations that have a relatively short run within a single building.
The User State Migration Tool component that is used to capture the configuration settings of a computer.
A list of available addresses that is configured on a DHCP server to be assigned to clients.
A protocol that runs at the Application layer of the OSI model and is used for secure copying of files between computers.
A program used for secure remote logon, remote control, and file transfer. SSH provides strong encryption during and after authentication.
Also called Transport Layer Security, SSL is used to encrypt data at the Transport layer when that data flows between a web server and a web client.
A connection-oriented protocol that is part of the IPX/SPX suite. SPX provides the reliability of the IPX/SPX suite by requiring and receiving acknowledgments.
The sequential exchange of information between computers and peripheral devices one bit at a time over a single channel.
The original protocol that allowed computers to communicate over regular telephone lines. SLIP has been replaced by PPP.
A protocol and message format used by DOS and Windows to share files, directories, and services.
A protocol used by NetWare to allow systems providing services, such as file and print services, to announce their services to the network.
Software that can be installed on a Microsoft client computer to enable it to connect to a Unix server and gain access to resources for which the user has been given permissions.
Rules and settings on a folder or printer that control a user's access to that resource through the network. These settings include Read, Change, and Full Control.
Folders on a computer that have been made available to other computers and users who can access the folders through the computer network.
A permission system whereby files are only shared by placing them into the Shared Files folder. NTFS permissions are not controlled and remain in their default position. Simple file sharing is enabled by default in Windows XP Home Edition and can be selected in Windows XP Professional.
An Application layer protocol (part of the TCP/IP protocol suite) that is used to send e-mail through a network or through the Internet.
A management protocol that can gather information about computers and other network devices on a TCP/IP network.
A single region on a hard disk or multiple regions on the same hard disk that are linked together. Simple volumes are not fault tolerant.
The type of directory replication that is used by Windows NT domain controllers whereby all changes are made on the primary domain controller (PDC) and replicated to all of the backup domain controllers (BDCs).
The process of logging on one time and being able to access resources throughout the network, including resources on different operating systems.
Relatively inexpensive routers designed to be installed on a very small network. These routers typically come with installation software and often have other features, such as automatic address assignment and firewalls.
"Listening" to the network with network monitoring devices. Internal attackers might sniff the network to uncover secret, confidential, or private information.
A region of disk space that exists on more than one hard disk. The size of a spanned volume is increased by extending it onto additional dynamic disks.
NTFS permissions that are not standard but instead are customized. Special permissions display as Special in the advanced settings of NTFS permissions.
Fiber-optic cable connectors most commonly used with single-mode fiber-optic cable.
The most common topology used in networks today. A group of computers is connected to a central location such as a hub or a switch.
An error that occurs when a computer is in the processes of booting or accessing the operating system.
An address that is manually entered into a computer or network device to enable it to communicate on a network. Typically servers, router interfaces, and network printers are assigned static IP addresses.
An error that occurs in the text mode of Windows installation that causes the computer to stop installing software and to stop responding to all user input.
Any device that is installed or connected to a computer for the purpose of storing data.
Regions of hard disk space that are composed of "stripes" of equal-size data that are written across all of the disks in the volume.
The process of dividing a network into multiple networks by borrowing bits from the hosts to make additional networks. This is accomplished by changing the subnet mask of the IP addresses used.
A device that works at the Data Link layer of the OSI model, providing hardware-based filtering and network segmentation by building a table containing MAC addresses of source hosts.
Processes that utilize a single key. Unlike asymmetric processes that require two different keys, a symmetric process requires only a single key to encrypt and decrypt a file. Many symmetric keys are simple passwords.
The process of ensuring that shared folders and offline copies of the folders have the same content. This can be accomplished manually or with some automation.
That portion of the Access Control List that contains entries specifying what actions and user, group, or computers accounts will be audited.
The partition in the computer that contains the files required to successfully boot the computer and locate the operating system.
The folder on the boot partition in which the Windows system files are stored. On most client computers this is the C:/system32 folder.
3.146.107.89