Glossary
This Glossary has several important features you need to be aware of. First, every acronym in the entire book is listed here--even if there's a better-than-even chance you already know what the acronym means. This way there isn't any doubt that you'll always find everything you need to use the book properly. The second thing you need to know is that these definitions are specific to the book. In other words, when you look through this Glossary, you're seeing the words defined in the context that they're used. This may or may not always coincide with current industry usage since the computer industry changes the meaning of words so often. Finally, the definitions here use a conversational tone in most cases. This means that they may sacrifice a bit of puritanical accuracy for the sake of better understanding.
Web Link: What happens if you can't find the acronym you need in the computer dictionary you just bought? Fortunately there are two sites on the Internet that you can go to for help. The first is the Hill Associates, Inc. site at http://mailme.hill.com/acronyms/. This site is updated fairly often and provides only acronyms. The second site is BABEL: A Glossary of Computer Oriented Abbreviations and Acronyms. You'll find it at http://www.access.digex.net/%7Eikind/babel.html. While this site isn't updated as often as the first one, it does have the advantage of providing both acronyms and very terse definitions.
128-bit/40-bit encryption key--(See Encryption level)
Access control entry-- (See ACE)
Access control list-- (See ACL)
ACE (access control entry) --A Windows NT-specific security component. Each object (which could include anything from a file to a piece of memory) contains two access control lists (ACLs). These lists determine what type of access a user, system element, or other type of object will have to the object. Within each ACL are one or more access control entries (ACEs). There is one entry for each user, group, or other object that has access to the object. This entry defines what type of access to grant. For example, a file object can grant read and write rights.
ACL (access control list) --A Windows NT-specific security component. There are two ACLs: the security access control list (SACL), which controls Windows' auditing feature, and the discretionary access control list (DACL), which controls who can actually use the object. The ACLs contain one or more access control entries (ACEs), which determine the actual rights for each user or object for which the ACL grants access.
ActiveX control-- (See OCX)
ActiveX Document--One of several COM-based enabling technologies used on the Internet to display documents in formats that the Internet doesn't support natively, such as the Word for Windows DOC file format. Using ActiveX Document allows the OLE server to take over the browser's frame (menu and other features such as scroll bars) and present the document within the browser window.
ActiveX Movie--One of several COM-based enabling technologies used on the Internet to display real-time video and audio through the use of special file formats such as AVI files. ActiveX Movie may eventually allow companies to provide online presentations that don't require a person's presence at a particular site for participation.
Animated GIF-- (See GIF)
API (application programming interface) --A method of defining a standard set of function calls and other interface elements. It usually defines the interface between a high-level language and the lower-level elements used by a device driver or operating system. The ultimate goal is to provide some type of service to an application that requires access to the operating system or device feature set.
Application programming interface-- (See API)
AVI (audiovisual interface) file format--A special file format that contains both audio and video in digital format. AVI is currently the most popular method for transmitting multimedia files across the Internet.
Binary values--Refers to a base 2 data representation in the Windows registry. Normally used to hold status flags or other information that lends itself to a binary format.
BLOB (binary large object) --A special field in a database table that accepts objects such as bitmaps, sounds, or text as input. This field is normally associated with the OLE capabilities of a DBMS, but some third-party products make it possible to add BLOB support to older database file formats such as Xbase DBF file format. BLOB fields always imply OLE client support by the DBMS.
BMP files--Windows' standard bitmap graphics data format. This is a raster graphic data format that doesn't include any form of compression. It's normally used by Windows, but OS/2 (and various other operating systems) can also use this data format to hold graphics of various types.
Browse--A special application interface element designed to show the user an overview of a database or other storage media (for example, the thumbnail sketches presented by some graphics applications). Think of a browse as the table of contents to the rest of the storage area. A browse normally contains partial views of several data storage elements (records or picture thumbnails in most cases) that a user can then zoom to see their entirety. A browse form normally contains scrollbars or other high-speed interface elements to make it easier for the user to move from one section of the overall storage media to the next.
Browser--A special application normally used to display data downloaded from the Internet. The most common form of Internet data is the HTML (hypertext markup language) page. However, modern browsers can also display various types of graphics and even standard desktop application files such as Word for Windows documents directly. The actual capabilities provided by a browser vary widely depending on the software vendor and platform.
CAB (cabinet) file--A compressed format file similar to the ZIP files used to transfer code and data from one location to another. The CAB format is normally used only by developers.
CCITT (Consultative Committee for International Telegraph and Telephony) --This group is now the ITU. Please see ITU for details.
CGI (common gateway interface) --One of the more common methods of transferring data from a client machine to a Web server on the Internet. CGI relies on scripts to define how the data should be interpreted. There are two basic data transfer types. The user can send new information to the server or can query data already existing on the server. For example, a data entry form asking for the user's name and address would be an example of the first type of transaction. A search engine page on the Internet (a page that helps the user find information on other sites) is an example of the second type of transaction. The Web server normally provides some type of feedback for the user by transmitting a new page of information once the CGI script is complete. This could be as simple as an acknowledgment for data entry or a list of Internet sites for a data query.
Class ID-- (See CLSID)
Client--The recipient of data, services, or resources from a file or other server. This term can refer to a workstation or an application. The server can be another PC or an application.
CLSID (class ID or identifier) --A method of assigning a unique identifier to each object in the registry. Also refers to various high-level language constructs. Every object must provide a unique CLSID. The identifier is generated locally on the machine where the object is created, using some type of special software. (For example, the Microsoft OLE 2 SDK provides a utility for generating CLSIDs.) High-level languages such as Visual Basic and most C compilers normally perform the CLSID generation sequence automatically for the programmer.
COM (component object model) --A Microsoft specification for an object-oriented code and data encapsulation method and transference technique. It's the basis for technologies such as OLE (object linking and embedding) and ActiveX (the replacement name for OCXs--an object-oriented code library technology). COM is limited to local connections. DCOM (distributed component object model) is the technology used to allow data transfers and the use of OCXs within the Internet environment.
Common gateway interface-- (See CGI)
Component object model-- (See COM)
Container--Part of the object-oriented terminology that has become part of OLE. A container is a drive, file, or other resource used to hold objects. The container is normally referenced as an object itself.
Cookie--One or more special files used by an Internet browser to store site-specific settings or other information specific to Web pages. The purpose of this file is to store the value of one or more variables so that the Web page can restore them the next time the user visits a site. A Webmaster always saves and restores the cookie as part of some Web page programming task using a programming language such as JavaScript, Java, VBScript, or CGI. In most cases this is the only file that a Webmaster can access on the client site's hard drive. The cookie could appear in one or more files anywhere on the hard drive, depending on the browser currently in use. Microsoft Internet Explorer uses one file for each site storing a cookie and places them in the Cookies folder that normally appears under the main Windows directory. Netscape Navigator uses a single file named COOKIE.TXT to store all of the cookies from all sites. This file normally appears in the main Navigator folder.
CryptoAPI-- (See Cryptographic Application Programming Interface)
Cryptographic Application Programming Interface (CryptoAPI) --The specification provided by Microsoft that enables software developers to add encryption technology to their applications. It uses a 128-bit encryption technology, which means that the developer can't export such applications outside the United States or Canada.
Cryptographic Service Provider-- (See CSP)
CSP (Cryptographic Service Provider) --A specialty company that deals in certifying the identity of companies, developers, or individuals on the Internet. This identification check allows the company to issue an electronic certificate, which can then be used to conduct transactions securely. Several levels of certification are normally provided within a specific group. For example, there are three levels of individual certification. The lowest merely verifies the individual's identity through an Internet mail address. The highest level requires the individual to provide written proof along with a notarized statement. When you access a certified site or try to download a certified document such as an ActiveX control, the browser will display the electronic certificate onscreen, allowing you to make a security determination based on fact.
DACL (discretionary access control list) --A Windows NT-specific security component. The DACL controls who can actually use the object. You can assign both groups and individual users to a specific object.
Database management system-- (See DBMS)
DBMS (database management system) --A collection of tables, forms, queries, reports, and other data elements. It acts as a central processing point for data accessed by one or more users. Most DBMSs (except those that are free-form or text-based) rely on a system of tables for storing information. Each table contains records (rows) consisting of separate data fields (columns). Common DBMSs include Access, Paradox, dBASE, and Filemaker Pro.
DCOM (distributed component object model) --The advanced form of the component object model (COM) used by the Internet. This particular format enables data transfers across the Internet or other nonlocal sources. It adds the capability to perform asynchronous as well as synchronous data transfers--which prevents the client application from becoming blocked as it waits for the server to respond. See COM for more details.
DDE (dynamic data exchange) --The ability to cut data from one application and paste it into another application. For example, you could cut a graphic image created with a paint program and paste it into a word processing document. Once pasted, the data doesn't reflect the changes made to it by the originating application. DDE also provides a method for communicating with an application that supports it and for requesting data. For example, you could use an Excel macro to call Microsoft Word and request the contents of a document file. Some applications also use DDE to implement file association strategies. For example, Microsoft Word uses DDE in place of command line switches to gain added flexibility when a user needs to open or print a file.
DDF (Diamond Directive File) --Similar to an INF (information) or BAT (batch) file, the DDF provides instructions to a CAB (cabinet) creation utility such as DIANTZ for compressing one or more files into a single storage file. CAB files are normally used to distribute data locally, using a CD-ROM or other similar type of media, or remotely, through an Internet or other server connection. The DDF can also list files needed for a complete installation, but stored in other locations. Normally these missing files will already appear on the user's computer, so downloading them again would waste time. The DDF makes it possible to download them only as needed.
Diamond Directive File-- (See DDF)
Digital Signatures Initiative-- (See DSI)
Discretionary access control list-- (See DACL)
Distributed component object model-- (See DCOM)
DLL (dynamic link library) --A specific form of application code loaded into memory by request. It's not executable by itself. A DLL does contain one or more discrete routines that an application may use to provide specific features. For example, a DLL could provide a common set of file dialogs used to access information on the hard drive. More than one application can use the functions provided by a DLL, reducing overall memory requirements when more than one application is running.
Drag and drop--A technique used in object-oriented operating systems to access data without actually opening the file using conventional methods. For example, this system allows the user to pick up a document file, drag it to the printer, and drop it. The printer will print the document using its default settings.
DSI (Digital Signatures Initiative) --A standard originated by the W3C (World Wide Web Consortium) to overcome some limitations of channel-level security. For example, channel-level security can't deal with documents and application semantics. A channel also doesn't use the Internet's bandwidth very efficiently because all the processing takes place on the Internet rather than the client or server. This standard defines a mathematical method for transferring signatures--essentially a unique representation of a specific individual or company. DSI also provides a new method for labeling security properties (PICS2) and a new format for assertions (PEP). This standard is also built on the PKCS #7 and X509.v3 standards.
Dynamic data exchange-- (See DDE)
Dynamic link library-- (See DLL)
Encryption-- (See Cryptographic Application Programming Interface)
Encryption level--The amount of encryption a file receives. Normally, the size of the encryption key is the determining factor in the strength and level of encryption. Most Internet browsers and local applications use two sizes: 40-bit and 128-bit. A 40-bit key can provide up to 240 key combinations and is considered moderately difficult to break. A 128-bit key can provide up to 2128 key combinations and is considered very difficult to break. Only the 40-bit key technology is currently approved by the United States government for transport outside the United States or Canada. See Cryptographic Application Programming Interface for additional information.
File Transfer Management System-- (See FTMS)
File transfer protocol-- (See FTP)
FTMS (File Transfer Management System) --The Proginet Corporation introduced this ActiveX technology, which brings mainframe data to the desktop. Their Fusion FTMS will work with any development language that supports OLE containers such as Delphi, Visual C++, and PowerBuilder. Essentially, you'll place an ActiveX control on a form, define where to find the data, and then rely on the control to make the connection. Using this control reduces the amount of labor required to implement and maintain a mainframe connection. A special transfer server on the mainframe completes the package by automating all transfer requests. No longer does an operator have to manually download a needed file to the company's Web site before a client can access it. Users can directly access the data on the mainframe and download it to their local hard drive.
FTP (file transfer protocol) --One of several common data transfer protocols for the Internet. This particular protocol specializes in data transfer in the form of a file download. The user is presented with a list of available files in a directory list format. An FTP site may choose DOS or UNIX formatting for the file listing, though the DOS format is extremely rare. Unlike HTTP sites, an FTP site provides a definite information hierarchy through the use of directories and subdirectories, much like the file directory structure used on most workstation hard drives.
GIF (graphics interchange format) --The standard file format used to transfer data over the Internet. There are several different standards for this file format--the latest of which is the GIF89a standard you'll find used on most Internet sites. The GIF standard was originally introduced by CompuServe as a method for reducing the time required to download a graphic and the impact of any single bit errors that might occur. A secondary form of the GIF is the animated GIF. It allows the developer to store several images within one file. Between each file is one or more control blocks that determine block boundaries, the display location of the next image in relation to the display area, and other display features. A browser or other specially designed application will display the graphic images one at a time in the order they appear within the file to create animation effects.
Gopher--One of several common Internet data transfer protocols. Like FTP, Gopher specializes in file transfers. However, the two protocols differ in that Gopher always uses the UNIX file-naming convention, and it provides a friendlier interface than FTP. Even though Gopher transfers tend to be more reliable than those provided by FTP, FTP sites are far more common.
Graphics interchange format-- (See GIF)
HTML (hypertext markup language) --A scripting language for the Internet that depends on the use of tags (keywords within angle brackets <>) to display formatted information onscreen in a non-platform-specific manner. The non-platform-specific nature of this scripting language makes it difficult to perform some basic tasks such as placement of a screen element at a specific location. However, the language does provide for the use of fonts, color, and various other enhancements onscreen. There are also tags for displaying graphic images. Scripting tags for using more complex scripting languages such as VBScript and JavaScript were recently added, though not all browsers support this addition. The latest tag addition allows the use of ActiveX controls.
HTTP (hypertext transfer protocol) --One of several common data transfer protocols for the Internet. This particular protocol specializes in the display of onscreen information such as data entry forms or informational displays. HTTP relies on HTML as a scripting language for describing special screen display elements, though you can also use HTTP to display nonformatted text.
Hypertext markup language-- (See HTML)
Hypertext transfer protocol-- (See HTTP)
IDAPI (Independent Database Application Programming Interface) --A set of Windows function calls and other interface elements introduced by companies led by Borland. IDAPI is designed to improve access to information contained in database files through the use of a common interface and data-independent access methods.
IETF (Internet Engineering Task Force) --The standards group tasked with finding solutions to pressing technology problems on the Internet. This group can approve standards created both within the organization itself and outside the organization as part of other group efforts. For example, Microsoft has requested the approval of several new Internet technologies through this group. If approved, the technologies would become an Internet-wide standard for performing data transfer and other specific kinds of tasks.
IMTF (Internet Management Task Force) --The standards group responsible for implementing new technologies on the Internet. The problem is that this group is mainly composed of volunteers. The wheels of progress grind slowly for the IMTF, just like any other standards organization. It's so slow, in fact, that many companies have come up with their own solutions for making the Internet a friendlier place to work. For example, Microsoft has developed ActiveX in response to specific Internet-related problems, while Netscape has developed Netscape ONE (Open Network Environment).
Independent Database Application Programming Interface-- (See IDAPI)
INF (information) file--A special form of device or application configuration. It contains all the parameters that Windows requires to install or configure the device or application. For example, an application INF file might contain the location of data files and the interdependencies of DLLs. Both application and device INF files contain the registry and INF file entries required to make Windows recognize the application or device.
International Telephony Union-- (See ITU)
Internet Engineering Task Force-- (See IETF)
Internet Management Task Force-- (See IMTF)
Internet protocol-- (See IP)
Internet Server Application Programming Interface-- (See ISAPI)
IP (Internet protocol) --The information exchange portion of the TCP/IP protocol used by the Internet. IP is an actual data transfer protocol that defines how the information is placed into packets and sent from one place to another. TCP (transmission control protocol) is the protocol that defines how the actual data transfer takes place. One of the problems with IP that standards groups are addressing right now is that it doesn't encrypt the data packets--anyone can read a packet traveling on the Internet. Future versions of IP will address this need by using some form of encryption technology. In the meantime, some companies have coupled TCP with other technologies to provide encryption technology for the short term.
ISA--(See ISAPI Server Addition)
ISAPI (Internet Server Application Programming Interface) --A set of function calls and interface elements designed to make using Microsoft's Internet Information Server (IIS) and associated products such as Peer Web Server easier. Essentially this set of API calls provides the programmer with access to the server itself. Such access makes it easier to provide full server access to the Internet server through a series of ActiveX controls without the use of a scripting language.
ISAPI Server Addition (ISA)--A special form of ActiveX control in DLL form that's placed on a Web server. The DLL gets called in one of several ways like a request from a client or when a particular event takes place. There are two forms of ISA: filter and extension. A filter allows you to keep something out or in by monitoring events on your server. For example, you could create an ISA filter that keeps people out of your Web site unless they enter the right password. Another type of filter could prevent files larger than a certain size from getting uploaded to the FTP server on your Web site. Extensions are more like applications or background processes. For example, you could create an extension that allows the user to interact with a database without resorting to using scripts. The same extension could create Web pages dynamically based on the user input and the contents of the database on your server.
ITU (International Telephony Union) --Formerly the CCITT. This group is most famous for their standards concerning modem communications. However, in recent years, this group has also begun work with both FAX and Internet standards (among other concerns). All of the older ITU standards still use the CCITT moniker. Newer standards use the ITU moniker. Unlike many other standards groups, the ITU is multi-national and is staffed by representatives from many different countries.
Joint Pictures Entertainment Group file format-- (See JPEG file format)
JPEG file-- (See JPEG file format)
JPEG (Joint Pictures Entertainment Group) file format--One of two graphics file formats used on the Internet. This is a vector file format normally used to render high-resolution images or pictures.
LAN (local area network) --A combination of hardware and software used to connect a group of PCs to each other and/or to a mini or mainframe computer. Two main networking models are in use: peer-to-peer and client/server. The peer-to-peer model doesn't require a dedicated server. In addition, all the workstations in the group can share resources. The client/server model uses a central server for resource sharing, but some special methods are provided for using local resources in a limited way.
Local area network-- (See LAN)
Locally unique identifier-- (See LUID)
LUID (locally unique identifier) --Essentially a pointer to an object, the LUID identifies each process and resource for security purposes. In other words, even if a user has two copies of precisely the same resource option (like a document), both copies would have a unique LUID. This method of identification prevents some types of security access violation under Windows NT.
Macro--A form of programming that records keystrokes and other programming-related tasks to a file on disk or within the current document. Most applications provide a macro recorder that records the keystrokes and mouse clicks you make. This means that you don't even have to write them, in most cases. Macros are especially popular in spreadsheets. Most macros use some form of DDE to complete OLE-related tasks.
Mail Handling Service-- (See MHS)
Mail Transfer System-- (See MTS)
MFC (Microsoft Foundation Class) files--The set of DLLs required to make many Microsoft applications work. These files contain the shared classes used as a basis for creating the application. For example, a pushbutton is a separate class within these files. Normally, you'll find the MFC files in the Windows SYSTEM folder--they use MFC as the starting letters of the filename.
MHS (Mail Handling Service) --A method for encrypting and decrypting user mail and performing other mail management services. Most NOSs provide some type of MHS as part of the base system. Several standards are available on the Internet for providing MHS as part of a Web site. The two most notable specifications are IETF RFC1421from the IETF and X.400 from the ITU (formerly CCITT).
Microsoft Foundation Class files-- (See MFC files)
MTS (Mail Transfer System) --A method of transferring mail from one location to another. In most cases this requires some form of encryption along with other transport-specific issues. Most NOSs provide some type of MTS as part of their base services. However, the Internet requires special transport mechanisms. Several standards are available on the Internet for providing MTS as part of a Web site. The two most notable specifications are IETF RFC1421 from the IETF and X.400 from the ITU (formerly CCITT).
Nested objects--Two or more objects that are coupled in some way. The objects normally appear within the confines of a container object. Object nesting allows multiple objects to define the properties of a higher-level object. It also allows the user to associate different types of objects with each other.
Netscape ONE (Open Network Environment) --A set of specialized application programming interfaces (APIs) and class libraries based on the Internet Inter-ORB Protocol (IIOP) and Common Object Request Broker Architecture (CORBA) specifications that enable a programmer to create customized Internet applications. One of the benefits of this customization is that the programmer could get by without using CGI or other scripting languages to access data on the server, a requirement using standard HTTP. ONE currently includes five Java-based foundation class libraries: User Interface Controls, User Interface Services, Security, Messaging, and Distributed Objects. Future plans include foundation classes for databases, and file server directory library access for Novell's NetWare Directory Services (NDS) and other products. This new technology also requires a JavaScript upgrade that Microsoft may or may not support.
Network interface card-- (See NIC)
NIC (network interface card) --The device responsible for allowing a workstation to communicate with a file server and other workstations. It provides the physical means of creating the connection. The card plugs into an expansion slot in the computer. A cable that attaches to the back of the card completes the communication path.
NOS (network operating system) --The operating system that runs on the file server or other centralized file/print sharing devices. This operating system normally provides multiuser access capability and user accounting software in addition to other network-specific utilities.
Object conversion--A method of changing the format and properties of an object created by one application to the format and properties used by another. Conversion moves the data from one application to another, usually without a loss in formatting, but always without a loss of content.
Object linking and embedding-- (See OLE)
OCX (OLE Control eXtension) --A special form of VBX designed to make adding OLE capabilities to an application easier for the programmer. Essentially, an OCX is a DLL with an added programmer and OLE interface.
ODBC (Open Database Connectivity) --A set of Windows function calls and other interface elements introduced by Microsoft. ODBC is designed to improve access to information contained in database files through the use of a common interface and data-independent access methods. Normally, ODBC relies on SQL to translate DBMS-specific commands from the client into a generic language. The ODBC agents on the server translate these SQL requests into server-specific commands.
OLE (object linking and embedding) --The process of packaging a filename and any required parameters into an object and then pasting this object into the file created by another application. For example, you could place a graphic object within a word processing document or spreadsheet. When you look at the object, it appears as if you simply pasted the data from the originating application into the current application (similar to DDE). When linked, the data provided by the object automatically changes as you change the data in the original object. When embedded, the data doesn't change unless you specifically edit it, but the data retains the original format and you still use the original application to edit the data. Often you can start the originating application and automatically load the required data by double-clicking on the object. The newer OLE 2 specification allows for in-place data editing as well as editing in a separate application window.
OLE Control eXtension-- (See OCX)
ONE-- (See Netscape ONE)
Open Database Connectivity-- (See ODBC)
PCT (Private Communication Technology) --The IETF is working with Microsoft on this particular protocol. Like SSL, PCT is designed to provide a secure method of communication between a client and server at the low protocol level. It can work with any high-level protocol such as HTTP, FTP, or TELNET. PCT is designed to prevent hackers from eavesdropping on communications between a client and server through the use of encryption, authentication, and digital signatures. As with SSL, client authentication is optional. PCT also assumes that you have TCP or another reliable transport protocol in place. It corrects some inherent weaknesses in SSL by providing extended cryptographic negotiation and other added features.
PEM (Privacy Enhanced Mail) --A set of four approved IETF specifications (IETF RFC1421 through IETF RFC1424) that define the methods for sending and receiving mail on the Internet. Of prime importance are techniques for encrypting and decrypting mail in such a way that optimal privacy is assured with a minimal amount of user interaction. The specification also covers topics related to mail encryption, including the certification of vendors to perform the service and the use of CSPs.
Privacy Enhanced Mail-- (See PEM)
Private Communication Technology-- (See PCT)
Private key file-- (See PVK)
PVK (private key file) --A file contained on either the client or server machine that allows full data encryption to take place. When the key in this file is combined with the public key provided with a file, the file becomes accessible. Since the PVK file never gets transmitted from one place to another, the level of data communication security is greatly increased. PVK files are used with all kinds of certificate-based communications. For example, getting a personal certificate from VeriSign or another organization involves creating a PVK on your computer. Developers also create a PVK for use with various types of Internet technologies such as ActiveX. The process of creating the private and public keys and assigning them to the actual component is called signing. In the same way, signed mail or other communications can greatly enhance security by making the author of the document known.
RAD (rapid application development) --A tool that allows you to design your program's interface and then write the commands to make that user interface do something useful. Visual Basic and Delphi are both examples of RAD programs.
Rapid application development-- (See RAD)
Remote access--The ability to use a remote resource as you would a local resource. In some cases, this also means downloading the remote resource to use as a local resource.
Remote procedure call-- (See RPC)
Rich Text Format-- (See RTF)
RPC (remote procedure call) --The ability to use code or data on a machine as if it were local. This is an advanced capability that will eventually pave the way for decentralized applications.
RTF (Rich Text Format) --A file format originally introduced by Microsoft that allows an application to store formatting information in plain ASCII text. All commands begin with a backslash. For example, the \cf command tells an RTF-capable editor which color to use from the color table when displaying a particular section of text.
SACL (security access control list) --The SACL controls Windows' auditing feature. Every time a user or group accesses an object and the auditing feature for that object is turned on, Windows makes an entry in the audit log.
Secure Sockets Layer-- (See SSL)
Security access control list-- (See SACL)
Security identifier-- (See SID)
ShellX (Shell extension) --A special application that gives some type of added values to the operating system interface. In most cases, the application must register itself with the registry before the operating system will recognize it.
SID (security identifier) --The part of a user's access token that identifies the user throughout the network--it's like having an account number. The user token that the SID identifies tells what groups the user belongs to and what privileges the user has. Each group also has a SID, so the user's SID contains references to the various group SIDs that he or she belongs to, not a complete set of group access rights. You would normally use the User Manager utility under Windows NT to change the contents of this access token.
SQL (Structured Query Language) --Most DBMSs use this language to exchange information. Some also use it as a native language. SQL provides a method for requesting information from the DBMS. It defines which table or tables to use, what information to get from the table, and how to sort that information.
SSL (Secure Sockets Layer) --A W3C standard originally proposed by Netscape for transferring encrypted information from the client to the server at the protocol layer. Sockets allow low-level encryption of transactions in higher-level protocols such as HTTP, NNTP, and FTP. The standard also specifies methods for server and client authentication (though client site authentication is optional).
Stickey Keys--One of several special features provided by Microsoft to help the physically challenged use computers better. This feature is provided as part of the Accessibility applet in Windows 95 and Windows NT 4.0.
Stream object--An encapsulated data container used to transfer information from one object to another. For example, a stream object could move data from application memory to a file on disk.
Structured Query Language-- (See SQL)
TCP/IP (transmission control protocol/Internet protocol) --A standard communication line protocol developed by the U.S. Department of Defense. The protocol defines how two devices talk to each other. Think of the protocol as a type of language used by the two devices.
Token calls--Part of the Windows NT security API that deals with user access to a particular object. To gain access to an object, the requesting object must provide a token. In essence, a token is a ticket to gain entrance to the secured object. The security API compares the rights provided by the requesting object's token with those required to gain entry to the secured object. If the requesting object's rights are equal to or greater than those required to gain entry, then the operating system grants access. Tokens are a universal form of entry under Windows NT and aren't restricted to the user or external applications. Even the operating system must use them.
UNC (uniform naming convention) --A method for identifying network resources without using specific locations. In most cases this convention is used with drives and printers, but it can also be used with other types of resources. A UNC normally uses a device name in place of an identifier. For example, a disk drive on a remote machine might be referred to as "\\AUX\DRIVE-C". The advantage of using a UNC is that the resource name won't change even if the resource location does (as would happen if users changed drive mappings on their machine).
Uniform naming convention-- (See UNC)
Uniform resource locator-- (See URL)
URL (uniform resource locator) --The basic method of identifying a location on the Internet. A resource could be a file, a Web site, or anything else you can access through this media. The URL always contains three essential parts. The first part identifies the protocol used to access the resource. For example, the letters http at the beginning of an URL always signify that the site uses the hypertext transfer protocol and will present some type of visual information. The second part of the URL is the name of a host. For example, the most popular host name is www, which stands for World Wide Web. The third part of the URL is a domain. This is normally the name of the site machine and the kind of site you plan to access. (For example, MyCompany.com would tell you that the domain is a machine named MyCompany and that it's some kind of commercial site.) After the site information are directories, just like you have on your hard drive. So an URL like http://www.mycompany.com/mysite.html would point to a Web page that uses HTTP on the World Wide Web at mycompany.com.
VBA (Visual Basic for Applications) --A form of Microsoft Visual Basic used by applications. It provides more capabilities than VBScript, yet less than the full-fledged Visual Basic programming language. The basic tenet of this language is full machine access without a high learning curve. VBA was originally designed to allow users to create script-type macros and provide interapplication communication. It's been extended since that time to provide a higher-level programming language for times when VBScript doesn't provide enough capabilities to perform a specific task.
VBX (Visual Basic eXtension) --A special form of DLL that contains functions as well as a programmer interface. The DLL part of VBX accepts requests from an application for specific services, such as opening a file. The programmer interface portion appears on the toolbar of a program, such as Visual Basic, as a button. Clicking the button creates one instance of that particular type of control.
Virtual reality modeling language-- (See VRML)
Visual Basic eXtension-- (See VBX)
Visual Basic for Applications-- (See VBA)
VRML (virtual reality modeling language) --A special scripting (scene description) language that allows a Web site to transfer vector graphic imaging information with a minimum of overhead. The value of this language is that it uses very little actual data to transfer the coordinate information required. VRML is still very much in the experimental stage--transaction speeds are a major concern due to the relatively narrow bandwidth of current dial-up connections and the multitude of changes that take place during a VRML session. Even using minimized data transfer doesn't make VRML a fast performer with the current state of technology.
W3C (World Wide Web Consortium) --A standards organization essentially devoted to Internet security issues, but also involved in other issues such as the special <OBJECT> tag required by Microsoft to implement ActiveX technology. The W3C first appeared on the scene in December 1994 when they endorsed SSL (Secure Sockets Layer). In February 1995 they also endorsed application-level security for the Internet. Their current project is the Digital Signatures Initiative--W3C presented it in May 1996 in Paris.
WAN (wide area network) --A grouping of two or more LANs in more than one physical location.
Wide area network-- (See WAN)
World Wide Web Consortium-- (See W3C)