An icon that represents embedded or linked information. That information may consist of a complete file, such as a Paint bitmap, or part of a file, such as a spreadsheet cell . When you choose the package, the application used to create the object either plays the object (for example, a sound file) or opens and displays the object. If you change the original information, linked information is automatically updated. However, you must manually update embedded information.
package distribution
In Systems Management Server, the process of placing a decompressed package image on distribution points, sharing that image, and making it accessible to clients . This process occurs when you specify distribution points for a package. See also distribution point.
An Open Systems Interconnection (OSI) network layer transmission unit that consists of binary information representing both data and a header containing an identification number, source and destination addresses, and error-control data.
packet filtering
Prevents certain types of network packets from either being sent or received. This can be employed for security reasons (to prevent access from unauthorized users) or to improve performance by disallowing unnecessary packets from going over a slow connection. See also packet.
parent domain
For DNS and Active Directory, domains that are located in the namespace tree directly above other derivative domain names (child domains). For example, microsoft.com would be the parent domain for example.microsoft.com , a child domain. See also Active Directory; child domain; domain; Domain Name System (DNS).
parent object
An object in which another object resides. For example, a folder is a parent object in which a file, or child object, resides. An object can be both a parent and a child object. For example, a subfolder that contains files is both the child of the parent folder and the parent folder of the files.
perimeter network
An Internet Protocol (IP) network segment that contains resources, such as Web servers and virtual private network (VPN) servers, that are available to Internet users. Also known as screened subnet or demilitarized zone (DMZ) . See also Internet Authentication Service (IAS); Internet Protocol (IP); virtual private network (VPN).
A device, such as a disk drive, printer, modem, or joystick, that is connected to a computer and is controlled by the computer s microprocessor.
A rule associated with an object to regulate which users can gain access to the object and in what manner. Permissions are assigned or denied by the object s owner.
A utility that verifies connections to one or more remote hosts . The ping command uses Internet Control Message Protocol (ICMP) echo request and echo reply packets to determine whether a particular Internet Protocol (IP) system on a network is functional.
is useful for diagnosing IP network or router failures. See also host; Internet Control Message Protocol (ICMP); Internet Protocol (IP); packet.
Short for picture element, one spot in a rectilinear grid of thousands of such spots that form an image produced on the screen by a computer or on paper by a printer. A pixel is the smallest element that display or print hardware and software can manipulate to create letters , numbers , or graphics. Also called a pel .
Data that is not encrypted. Sometimes also called cleartext .
A type of client, such as Windows 2000, Windows NT 4.0, Windows Millennium Edition, Windows 98, Windows 3. x , Macintosh, or UNIX.
Plug and Play
A set of specifications developed by Intel Corporation that enables a computer to detect and configure a device automatically and install the appropriate device drivers. See also universal serial bus (USB).
Point-to-Point Protocol (PPP)
An industry standard suite of protocols for the use of point-to-point links to transport multiprotocol datagrams. PPP is documented in RFC 1661. See also Transmission Control Protocol/Internet Protocol (TCP/IP).
Point-to-Point Tunneling Protocol (PPTP)
Networking technology that supports multiprotocol virtual private networks (VPNs), enabling remote users to access corporate networks securely across the Internet or other networks by dialing into an Internet service provider (ISP) or by connecting directly to the Internet. PPTP tunnels, or encapsulates, Internet Protocol (IP) or Internetwork Packet Exchange (IPX) traffic inside IP packets. This means that users can remotely run applications that depend on particular network protocols. PPTP is described in RFC 2637. See also Internet Protocol (IP); Internetwork Packet Exchange (IPX); packet; tunnel; virtual private network (VPN).
pooled out-of-process
For IIS 5.0 isolation mode, a special Web Application Manager (WAM) package that hosts all out-of-process ISAPI extensions that are set to medium isolation within the same DLLHOST.exe process. See also IIS 5.0 isolation mode; out-of-process; Web Application Manager (WAM).
port number
A number that identifies a certain Internet application. For example, the default port number for the WWW service is 80.
A page-description language (PDL), developed by Adobe Systems for printing on laser printers. PostScript offers flexible font capability and high-quality graphics. It is the standard for desktop publishing because it is supported by imagesetters , the high-resolution printers used by printing services for commercial typesetting. See also service.
preshared key
An Internet Protocol security (IPSec) technology in which a shared, secret key is used for authentication in IPSec policy. See also Internet Protocol security (IPSec); key.
primary domain controller (PDC)
In a Windows NT domain, a domain controller running Windows NT Server 4.0 or earlier that authenticates domain logon attempts and updates user , computer, and group accounts in a domain. The PDC contains the master read-write copy of the directory database for the domain. A domain has only one PDC.
In a Windows 2000 or Windows Server 2003 domain, the PDC emulator master supports compatibility with client computers that are not running Windows 2000 or Windows XP Professional.
See also Active Directory; backup domain controller (BDC).
private key
The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key. See also public key.
process isolation
Running an application or component out of process.
A set of rules and conventions for sending information over a network. These rules govern the content, format, timing, sequencing, and error control of messages exchanged among network devices. See also Internet Protocol (IP); Transmission Control Protocol/Internet Protocol (TCP/IP).
proxy server
A firewall component that manages Internet traffic to and from a local area network (LAN) and that can provide other features, such as document caching and access control. A proxy server can improve performance by supplying frequently requested data, such as a popular Web page, and it can filter and discard requests that the owner does not consider appropriate, such as requests for unauthorized access to proprietary files. See also firewall; local area network (LAN).
public key
The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key. See also key; private key.
public key infrastructure (PKI)
The laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce. See also certificate; certification authority (CA); public key.
published application
An application that is available to users managed by a Group Policy object. Each user decides whether or not to install the published application by using Add or Remove Programs in Control Panel. See also Group Policy object (GPO).
pull partner
A WINS component that requests replication of updated WINS database entries from its push partner. See also push partner; Windows Internet Name Service (WINS).
push partner
A WINS component that notifies its pull partner when updated WINS database entries are available for replication. See also pull partner; Windows Internet Name Service (WINS).

The Microsoft Windows Server Team Migrating from Microsoft Windows NT Server 4.0 to Windows Server 2003
Migrating from Microsoft Windows NT Server 4.0 to Windows Server 2003
ISBN: 0735619409
EAN: 2147483647
Year: 2004
Pages: 96

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net