Apple Mac OS X Server Version 10.4 or Later Manual do Utilizador Página 107

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 113
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 106
Glossary 107
open relay A server that receives and automatically forwards mail to another server.
Junk mail senders exploit open relay servers to avoid having their own mail servers
blacklisted as sources of junk mail.
Open Relay Behavior-modification System See ORBS.
open source A term for the cooperative development of software by the Internet
community. The basic principle is to involve as many people as possible in writing and
debugging code by publishing the source code and encouraging the formation of a
large community of developers who will submit modifications and enhancements.
ORBS Open Relay Behavior-modification System. An Internet service that blacklists
mail servers known to be or suspected of being open relays for senders of junk mail.
ORBS servers are also known as “black-hole” servers.
permissions Settings that define the kind of access users have to shared items in a file
system. You can assign four types of permissions to a share point, folder, or file: read/
write, read-only, write-only, and none (no access). See also privileges.
plaintext Text that hasn’t been encrypted.
POP Post Office Protocol. A protocol for retrieving incoming mail. After a user retrieves
POP mail, it’s stored on the users computer and is usually deleted automatically from
the mail server.
port A sort of virtual mail slot. A server uses port numbers to determine which
application should receive data packets. Firewalls use port numbers to determine
whether or not data packets are allowed to traverse a local network. “Port usually
refers to either a TCP or UDP port.
Post Office Protocol See POP.
private key One of two asymmetric keys used in a PKI security system. The private key
is not distributed and usually encrypted with a passphrase by the owner. It can digitally
sign a message or certificate, claiming authenticity. It can decrypt messages encrypted
with the corresponding public key. Finally, it can encrypt messages that can only be
decrypted by the private key.
privileges The right to access restricted areas of a system or perform certain tasks
(such as management tasks) in the system.
public key One of two asymmetric keys used in a PKI security system. The public key is
distributed to other communicating parties. It can encrypt messages that can be
decrypted only by the holder of the corresponding private key, and it can verify the
signature on a message originating from a corresponding private key.
public key certificate See certificate.
Vista de página 106

Comentários a estes Manuais

Sem comentários