Microsoft Windows desktop operating systems security management Definitions

  • A

    Anna Kournikova virus VBS.SST

    The Anna Kournikova VBS.SST computer virus, informally known as "Anna," is a viral worm that uses Visual Basic to infect Windows systems when a user unwittingly opens an e-mail note with an attachment that appears to be a graphic image of Russian tennis star Anna Kournikova.

  • application performance monitoring (APM)

    Application performance monitoring, also called app monitoring, is an area of information technology (IT) that focuses on making sure software application programs perform as expected. The goal of performance monitoring is to provide end users with a quality end-user experience.

  • authentication ticket or ticket-granting ticket (TGT)

    An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.

  • B

    BIOS password

    A BIOS password is a security precaution that requires a computer user to log into the machine's basic input/output system (BIOS) before a computer will boot up.

  • C

    cellular automaton (CA)

    A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells.

  • checkpoint

    A checkpoint, in a virtualization context, is a snapshot of the state of a virtual machine. Like a restore point in Windows operating systems, a checkpoint allows the administrator to return the system to an earlier, functioning state if problems are encountered... (Continued)

  • D

    desktop personalization

    Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.

  • disk analyzer

    A disk analyzer is a piece of software that checks drives for space and usage and explores files and folders visually, simplifying file cleanup and optimization.

  • drive-by download

    A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge. Unlike a pop-up download, which asks for assent (albeit in a calculated manner likely to lead to a "yes"), a drive-by download can be initiated by simply visiting a Web site or viewing an HTML e-mail message... (Continued)

  • E

    Enterprise Device Alliance (EDA)

    The Enterprise Device Alliance (EDA) seeks to help administrators integrate iOS and Android devices into existing Windows environments.

  • G

    graphic equalizer

    A graphic equalizer is a high-fidelity audio control that allows the user to see graphically and control individually a number of different frequency bands in a stereophonic system.

  • H

    host intrusion prevention systems (HIPS)

    A host intrusion prevention system (HIPS) is a security method that relies on third-party software tools to monitor network traffic and system activities for anomalous code behavior to identify and prevent malicious activities.

  • I

    ISA Server (Internet Security and Acceleration Server)

    Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.0 (see proxy server) and is part of Microsoft's .NET support.

  • K

    key-value pair (KVP)

    A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.

  • kiosk mode (Windows assigned access)

    Kiosk mode is specialized function that allows Microsoft Windows to provide a single application for users signing on as guests or generic authorized users while preventing access to other files, data and functionality of the operating system and computer.

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

SearchExchange

Close