beautypg.com

HP Compaq t5720 Thin Client User Manual

Page 63

background image

Glossary

C

client: A device or program that uses shared resources from another computer, called a

server. In the context of the Agent, client refers to a Sygate Security Agent running
on a device that reports to a server.

computers: A personal computer, laptop, or workstation on which users perform work. In

an enterprise environment, computers are connected together over a network.

D

demilitarized zone (DMZ): A security measure used by a company that can host Internet

services and has devices accessible to the Internet; the DMZ is an area between the
Internet and the internal network that prevents unauthorized access to the internal
corporate network using a firewall or gateway.

Denial of Service (DoS): A network-based attack that is characterized by an explicit

attempt by an intruder to prevent legitimate users of a service from using that
service. See also Denial of Service Checking.

Denial of Service Checking: An advanced setting on the Agent that instructs the Agent to

check for incoming traffic using known Denial of Service (DoS) techniques.

DES: See Data Encryption Standard (DES).

destination IP address: The IP address of the computer that is receiving packets of

information.

destination port: The port of the computer that is receiving packets of information.

DHCP: See Dynamic Host Configuration Protocol (DHCP).

directory server: Software that manages users’ accounts and network permissions. Active

Directory is an example of a directory server accessed using Lightweight Directory
Access Protocol (LDAP). See also Active Directory, Lightweight Directory Access
Protocol (LDAP).

DLL: Dynamic link library, a list of functions or data used by Windows applications. Most

DLLs have a file extension of .dll, .ocx, .exe, .drv, or .fon.

DLL authentication: The ability to validate shared or application-specific dynamic link

libraries (DLLs) and ensure the integrity of applications. An Agent can be instructed
to allow or block known DLLs. An added level of protection can also be enabled to
block DLLs from being dynamically allowed when an application is executed. See
also application authentication, application fingerprint, DLL, DLL fingerprint.

53

This manual is related to the following products: