HP Compaq t5720 Thin Client User Manual
Page 64
HP Sygate Security Agent User Guide
DLL fingerprint: A 128-bit number that is generated by performing an MD5 hash of an
entire DLL packet. It is unique for each DLL. The MD5 hash or fingerprint of each
DLL is stored on the Sygate Security Agent and forwarded to the Sygate
Management Server. If the DLL is changed in any way, the DLL fingerprint changes.
See also DLL, DLL authentication, MD5 hash.
domain: A group of computers that are part of a network and share a common directory
database. Each domain has a unique name and is organized in levels that are
administered as a unit using common rules.
domain name: The name by which a group of computers is known to the network. Most
organizations have a unique name on the Internet that allows individuals, groups,
and other organizations to communicate with them. See also domain.
DoS attack: See Denial of Service (DoS).
driver-level protection: A Sygate software feature that blocks protocol drivers from gaining
access to the network unless a user gives permission. If a protocol driver attempts to
gain access to the network through a client running the Sygate Security Agent,
depending on the rule set, the protocol driver is allowed, blocked, or a pop-up
message displays. See also protocol driver blocking.
Dynamic Host Configuration Protocol (DHCP): A TCP/IP protocol that provides
dynamic configuration of host IP addresses and enables individual computers on an
IP network to extract configuration parameters from a DHCP server. DHCP lets a
system administrator supervise and distribute IP addresses from a central point in
the network.
E
EAP: Extensible Authentication Protocol. Sits inside of PPP’s authentication protocol and
provides a generalized framework for several different authentication methods. EAP
is used to pass the authentication information between the supplicant (the wireless
workstation) and the authentication server. The actual authentication is defined and
handled by the EAP type. The access point acting as authenticator is only a proxy to
allow the supplicant and the authentication server to communicate.
encryption: The use of an algorithm to convert typically sensitive data into a form that is
unreadable except by authorized users. See also Communications Channel
Encryption.
endpoint: Any network device that connects to the enterprise network and runs network-
based applications. Network devices can include laptops, desktop computers,
servers, and PDAs. See also access point.
54