S
Samba

An SMB type of connection protocol that enables Unix, Linux, and Microsoft clients to access resources on a network.

SC connectors

A fiber-optic type of connector similar to a common audio or video plug. These are used most often with multimode fiber installations that have a relatively short run within a single building.

scanstate

The User State Migration Tool component that is used to capture the configuration settings of a computer.

scope

A list of available addresses that is configured on a DHCP server to be assigned to clients.

Secure Copy Protocol (SCP)

A protocol that runs at the Application layer of the OSI model and is used for secure copying of files between computers.

Secure Shell (SSH)

A program used for secure remote logon, remote control, and file transfer. SSH provides strong encryption during and after authentication.

Secure Sockets Layer (SSL)

Also called Transport Layer Security, SSL is used to encrypt data at the Transport layer when that data flows between a web server and a web client.

Sequenced Packet Exchange (SPX)

A connection-oriented protocol that is part of the IPX/SPX suite. SPX provides the reliability of the IPX/SPX suite by requiring and receiving acknowledgments.

serial communication

The sequential exchange of information between computers and peripheral devices one bit at a time over a single channel.

Serial Line Interface Protocol (SLIP)

The original protocol that allowed computers to communicate over regular telephone lines. SLIP has been replaced by PPP.

Server Message Block

A protocol and message format used by DOS and Windows to share files, directories, and services.

Service Advertising Protocol (SAP)

A protocol used by NetWare to allow systems providing services, such as file and print services, to announce their services to the network.

Services for Unix

Software that can be installed on a Microsoft client computer to enable it to connect to a Unix server and gain access to resources for which the user has been given permissions.

share permissions

Rules and settings on a folder or printer that control a user's access to that resource through the network. These settings include Read, Change, and Full Control.

shared folders

Folders on a computer that have been made available to other computers and users who can access the folders through the computer network.

simple file sharing

A permission system whereby files are only shared by placing them into the Shared Files folder. NTFS permissions are not controlled and remain in their default position. Simple file sharing is enabled by default in Windows XP Home Edition and can be selected in Windows XP Professional.

Simple Mail Transfer Protocol (SMTP)

An Application layer protocol (part of the TCP/IP protocol suite) that is used to send e-mail through a network or through the Internet.

Simple Network Management Protocol (SNMP)

A management protocol that can gather information about computers and other network devices on a TCP/IP network.

simple volume

A single region on a hard disk or multiple regions on the same hard disk that are linked together. Simple volumes are not fault tolerant.

single master replication

The type of directory replication that is used by Windows NT domain controllers whereby all changes are made on the primary domain controller (PDC) and replicated to all of the backup domain controllers (BDCs).

single sign-on

The process of logging on one time and being able to access resources throughout the network, including resources on different operating systems.

Small Office/Home Office (SOHO) router

Relatively inexpensive routers designed to be installed on a very small network. These routers typically come with installation software and often have other features, such as automatic address assignment and firewalls.

sniffing

"Listening" to the network with network monitoring devices. Internal attackers might sniff the network to uncover secret, confidential, or private information.

spanned volume

A region of disk space that exists on more than one hard disk. The size of a spanned volume is increased by extending it onto additional dynamic disks.

special permissions

NTFS permissions that are not standard but instead are customized. Special permissions display as Special in the advanced settings of NTFS permissions.

ST connector

Fiber-optic cable connectors most commonly used with single-mode fiber-optic cable.

star topology

The most common topology used in networks today. A group of computers is connected to a central location such as a hub or a switch.

startup error

An error that occurs when a computer is in the processes of booting or accessing the operating system.

static IP address

An address that is manually entered into a computer or network device to enable it to communicate on a network. Typically servers, router interfaces, and network printers are assigned static IP addresses.

stop error

An error that occurs in the text mode of Windows installation that causes the computer to stop installing software and to stop responding to all user input.

storage device

Any device that is installed or connected to a computer for the purpose of storing data.

striped volume

Regions of hard disk space that are composed of "stripes" of equal-size data that are written across all of the disks in the volume.

subnetting

The process of dividing a network into multiple networks by borrowing bits from the hosts to make additional networks. This is accomplished by changing the subnet mask of the IP addresses used.

switch

A device that works at the Data Link layer of the OSI model, providing hardware-based filtering and network segmentation by building a table containing MAC addresses of source hosts.

symmetric

Processes that utilize a single key. Unlike asymmetric processes that require two different keys, a symmetric process requires only a single key to encrypt and decrypt a file. Many symmetric keys are simple passwords.

synchronization

The process of ensuring that shared folders and offline copies of the folders have the same content. This can be accomplished manually or with some automation.

System Access Control List (SACL)

That portion of the Access Control List that contains entries specifying what actions and user, group, or computers accounts will be audited.

system partition

The partition in the computer that contains the files required to successfully boot the computer and locate the operating system.

systemroot

The folder on the boot partition in which the Windows system files are stored. On most client computers this is the C:/system32 folder.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.146.107.89