The process of disguising a message or data in such a way as to hide its substance.
A legal agreement between a software or hardware manufacturer and the end user, with regard to the terms of use and transfer of the software.
A small range of one or more IP addresses within a DHCP scope excluded from the DHCP service. Exclusion ranges ensure that these scope addresses will never be offered to clients by the DHCP server.
See also scope.
An extension to the Point-to-Point Protocol (PPP) that allows for arbitrary authentication mechanisms to be employed for the validation of a PPP connection.
See also Point-to-Point Protocol (PPP).
A limited subset of computers or users on a public network, typically the Internet, that can access an organization's internal network. For example, the computers or users might belong to a partner organization.