A backup that copies all selected files that have been modified the day the daily backup is performed. The backed-up files are not marked as having been backed up (in other words, the archive attribute is not cleared). See also copy backup; differential backup; incremental backup; normal backup.
A service provided by cryptographic technology to ensure that data can be read only by authorized users or programs. In a network, data confidentiality ensures that data cannot be read by intruders. Windows 2000 and Windows XP Professional use access control mechanisms and encryption, such as DES, 3DES, and RSA encryption algorithms, to ensure data confidentiality. See also 3DES; cryptography; Data Encryption Standard (DES); RSA.
An encryption algorithm that uses a 56-bit key, and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the 8 bytes is used for odd parity, resulting in 56 bits of usable key.
A service provided by cryptographic technology that ensures data has not been modified. In a network environment, data integrity allows the receiver of a message to verify that data has not been modified in transit. Windows 2000 and Windows XP Professional use access control mechanisms and cryptography, such as RSA public-key signing and shared symmetric key one-way hash algorithms, to ensure data integrity. See also cryptography.
A unit of information transmitted as a whole from one device to another on a network.
A layer that packages raw bits from the physical layer into frames (logical, structured packets for data). This layer is responsible for transferring frames from one computer to another, without errors. After sending a frame, the data-link layer waits for an acknowledgment from the receiving computer.
To return media to the available state after they have been used by an application.
A state that indicates that media have reached their allocation maximum.
The process of making encrypted data readable again by converting ciphertext to plaintext. See also ciphertext; encryption; plaintext.
A configuration item for the TCP/IP protocol that is the IP address of a directly reachable IP router. Configuring a default gateway creates a default route in the IP routing table.
The process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed of access and retrieval. See also fragmentation.
An attack in which an attacker exploits a weakness or a design limitation of a network service to overload or halt the service, so that the service is not available for use. This type of attack is typically launched to prevent other users from using a network service such as a Web server or a file server.
The on-screen work area on which windows, icons, menus, and dialog boxes appear.
The directory (or folder) to which files are copied or moved. See also source directory.
A program that allows a specific device, such as a modem, network adapter, or printer, to communicate with the operating system. Although a device might be installed on your system, Windows cannot use the device until you have installed and configured the appropriate driver.
If a device is listed in the Hardware Compatibility List (HCL), a driver is usually included with Windows. Device drivers load automatically (for all enabled devices) when a computer is started, and thereafter run invisibly. See also Hardware Compatibility List (HCL).
An administrative tool that can be used to manage the devices on your computer. Use Device Manager to view and change device properties, update device drivers, configure device settings, and remove devices.
A hierarchical tree that contains the devices configured on a computer.
See definition for Dynamic Host Configuration Protocol (DHCP).
A service that enables a computer to function as a DHCP server and configure DHCP-enabled clients on a network. DHCP runs on a server, enabling the automatic, centralized management of IP addresses and other TCP/IP configuration settings for network clients.
The connection to your network if you are using a device that uses the telephone network. This includes modems with a standard phone line, ISDN cards with high-speed ISDN lines, or X.25 networks.
If you are a typical user, you might have one or two dial-up connections, for example, to the Internet and to your corporate network. In a more complex server situation, multiple network modem connections might be used to implement advanced routing.
A backup that copies files created or changed since the last normal or incremental backup. It does not mark files as having been backed up (in other words, the archive attribute is not cleared). If you are performing a combination of normal and differential backups, restoring files and folders requires that you have the last normal as well as the last differential backup. See also copy backup; daily backup; incremental backup; normal backup.
Saved copies of changed data that can be applied to an original volume to generate a volume shadow copy. See also volume; volume shadow copy.
A magnetic medium for recording and storing digital audio data.
An electronic certification issued by certification authorities that shows where a program comes from and proves that the installation package has not been altered. Administrators should sign their code with a digital certificate if planning to distribute an Internet Explorer package over the Internet. See also certification authority (CA).
A magnetic medium for backing up data. DLT can transfer data faster than many other types of tape media.
A means for originators of a message, file, or other digitally encoded information to bind their identity to the information. The process of digitally signing information entails transforming the information, as well as some secret information held by the sender, into a tag called a signature. Digital signatures are used in public key environments, and they provide nonrepudiation and integrity services. See also public key cryptography; timestamp.
A special communication line that uses modulation technology to maximize the amount of data that can be sent over copper wires. DSL is used for connections from telephone switching stations to a subscriber rather than between switching stations.
A type of optical disc storage technology. A digital video disc (DVD) looks like a CD-ROM disc, but it can store greater amounts of data. DVDs are often used to store full-length movies and other multimedia content that requires large amounts of storage space. See also DVD decoder; DVD drive.
For Microsoft networking, the sending of messages directly over the IPX protocol without the use of NetBIOS. While direct hosting may be more efficient, a direct hosting client can connect only to a direct hosting server. Windows XP Professional does not support direct hosting. See also Internetwork Packet Exchange (IPX); network basic input/output system (NetBIOS); NWLink.
Memory access that does not involve the microprocessor. DMA is frequently used for data transfer directly between memory and a peripheral device such as a disk drive. See also hardware configuration.
An information source that contains information about users, computer files, or other objects. In a file system, a directory stores information about files. In a distributed computing environment (such as a Windows domain), the directory stores information about objects such as printers, fax servers, applications, databases, and other users. See also domain.
Both the directory information source and the service that makes the information available and usable. A directory service enables the user to find an object when given any one of its attributes. See also Active Directory; directory.
To make a device nonfunctional. For example, if you disable a device in a hardware configuration, you cannot use the device when your computer uses that hardware configuration. Disabling a device frees the resources that were allocated to the device. See also hardware configuration.
The part of an object's security descriptor that grants or denies specific users and groups permission to access the object. Only the owner of an object can change permissions granted or denied in a DACL; thus, access to the object is at the owner's discretion. See also access control entry (ACE); object; security descriptor; security group; system access control list (SACL).
A condition that occurs when disk performance is reduced to the extent that overall system performance is affected.
The maximum amount of disk space available to a user.
To remove a removable tape or disc from a drive. See also library; mount.
A service that allows system administrators to organize distributed network shares into a logical namespace, enabling users to access files without specifying their physical location and providing load sharing across network shares.
The folder created on the Windows 2000-based distribution server to contain the Setup files.
See definition for direct memory access (DMA).
See definition for Domain Name System (DNS).
A client computer that queries Domain Name System (DNS) servers in an attempt to resolve DNS domain names. DNS clients maintain a temporary cache of resolved DNS domain names. See also DNS server; Domain Name System (DNS).
An updated specification to the DNS standard that permits hosts that store name information in DNS to dynamically register and update their records in zones maintained by DNS servers that can accept and process dynamic update messages. See also DNS; DNS server.
A server that maintains information about a portion of the Domain Name System (DNS) database and that responds to and resolves DNS queries. See also DNS client; Domain Name System (DNS).
In a DNS database, a zone is a contiguous portion of the DNS tree that is administered as a single separate entity by a DNS server. The zone contains resource records for all the names within the zone.
In Active Directory, a collection of computers defined by the administrator. These computers share a common directory database, security policies, and security relationships with other domains.
In DNS, any tree or subtree within the DNS namespace. Although the names for DNS domains often correspond to Active Directory domains, DNS domains should not be confused with Active Directory domains. See also Active Directory; Domain Name System (DNS).
In an Active Directory forest, a server that contains a writable copy of the Active Directory database, participates in Active Directory replication, and controls access to network resources. Administrators can manage user accounts, network access, shared resources, site topology, and other directory objects from any domain controller in the forest. See also Active Directory; authentication; directory; shared resource.
An implementation of DFS in which DFS topological information is stored in Active Directory. Because this information is made available on multiple domain controllers in the domain, domain DFS provides fault-tolerance for any distributed file system in the domain. See also fault tolerance.
A security or distribution group that can contain universal groups, global groups, other domain local groups from its own domain, and accounts from any domain in the forest. Domain local security groups can be granted rights and permissions on resources that reside only in the same domain where the domain local group is located. See also domain tree; forest; global group; security group; universal group.
The name given by an administrator to a collection of networked computers that share a common directory. Part of the Domain Name System (DNS) naming structure, domain names consist of a sequence of name labels separated by periods. See also domain; Domain Name System (DNS).
A hierarchical, distributed database that contains mappings of DNS domain names to various types of data, such as IP addresses. DNS enables the location of computers and services by user-friendly names, and it also enables the discovery of other information stored in the database. See also domain; IP address; Transmission Control Protocol/Internet Protocol (TCP/IP).
In DNS, the inverted hierarchical tree structure that is used to index domain names. Domain trees are similar in purpose and concept to the directory trees used by computer filing systems for disk storage. For example, when numerous files are stored on disk, directories can be used to organize the files into logical collections. When a domain tree has one or more branches, each branch can organize domain names used in the namespace into logical collections.
In Active Directory, a hierarchical structure of one or more domains, connected by transitive, bidirectional trusts, that forms a contiguous namespace. Multiple domain trees can belong to the same forest. See also Active Directory; domain; domain name; Domain Name System (DNS); forest.
A computer configuration that can start two different operating systems. See also multiple boot; startup environment.
A hardware or software component that allows a digital video disc (DVD) drive to display movies on your computer screen. See also digital video disc (DVD); DVD drive; hardware decoder; software decoder.
A disk storage device that uses digital video disc (DVD) technology. A DVD drive reads both CD-ROM and DVDs; however, you must have a DVD decoder to display DVD movies on your computer screen. See also digital video disc (DVD); DVD decoder.
An alternative keyboard with a layout that makes the most frequently typed characters more accessible to people who have difficulty typing on the standard QWERTY layout.
A physical disk that can be accessed only by Windows 2000 and Windows XP. Dynamic disks provide features that basic disks do not, such as support for volumes that span multiple disks. Dynamic disks use a hidden database to track information about dynamic volumes on the disk and other dynamic disks in the computer. You convert basic disks to dynamic by using the Disk Management snap-in or the DiskPart command-line tool. When you convert a basic disk to dynamic, all existing basic volumes become dynamic volumes. See also active volume; basic disk; basic volume; dynamic volume; partition; volume.
A TCP/IP service protocol that offers dynamic leased configuration of host IP addresses and distributes other configuration parameters to eligible network clients. DHCP provides safe, reliable, and simple TCP/IP network configuration, prevents address conflicts, and helps conserve the use of client IP addresses on the network.
DHCP uses a client/server model where the DHCP server maintains centralized management of IP addresses that are used on the network. DHCP-supporting clients can then request and obtain lease of an IP address from a DHCP server as part of their network boot process. See also IP address; Transmission Control Protocol/Internet Protocol (TCP/IP).
A volume that resides on a dynamic disk. Windows supports five types of dynamic volumes: simple, spanned, striped, mirrored, and RAID-5. A dynamic volume is formatted by using a file system, such as FAT or NTFS, and has a drive letter assigned to it. See also basic disk; basic volume; dynamic disk; mirrored volume; RAID-5 volume; simple volume; spanned volume; striped volume; volume.
An operating system feature that allows executable routines (generally serving a specific function or set of functions) to be stored separately as files with .dll extensions. These routines are loaded only when needed by the program that calls them.