Symantec 10521146 Administration Guide - Page 353
ODBC Open Database, are MacOS, Windows, DOS, and Linux.
UPC - 037648268134
View all Symantec 10521146 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 353 highlights
Glossary 353 node, standby The secondary node or nodes in a watchdog process or failover group. Standby nodes monitor traffic flows on designated network devices, but do not log data unless the active node fails. Standby nodes wait until the active node is out of commission before becoming active. notification An automatic alert message that notifies a security administrator that an event or error has occurred, or a predefined response that is triggered by a system condition, such as an event or error condition. Typical responses include sound or visual signals, such as displaying a message box, sending email, or paging a security administrator. The security administrator may be able to configure the response. object A graphical representation of a device or entity on your network with a unique address. You can create objects to represent network or Network Security devices such as servers or routers, as well as entities such as network segments or interfaces. The Network Security console displays objects in the topology tree on the Devices tab. ODBC (Open Database Connectivity) A standard or open application programming interface (API) for accessing a database. By using ODBC statements in a program, you can access files in a number of different databases, including Access, dBase, DB2, Excel, and Text. In addition to the ODBC software, a separate module or driver is needed for each database to be accessed. one-time password In network security, a password that is issued only once as a result of a challenge-response authentication process. This cannot be stolen or reused for unauthorized access. online The state of being connected to the Internet. When a user is connected to the Internet, the user is said to be online. OOBA (out-of-band authentication) A one-size-fits-all authentication sequence for protocols that require transparency or have their own authentication. OOBA allows you to authenticate with proxies, such as HTTP, SQLnet, and h323, that have not supported authentication on the firewall in the past. open source code A program whose source code is available for public inspection and revision. Open source software is often distributed freely, in the hope that the computing community will contribute to the program, helping to identify and eliminate bugs. Two well-known examples of open source programs are the Apache Web server and the Linux operating system. OS (operating system) The interface between the hardware of the computer and applications (for example a word-processing program). For personal computers, the most popular operating systems are MacOS, Windows, DOS, and Linux. packet A unit of data that is formed when a protocol breaks down messages that are sent along the Internet or other networks. Messages are broken down into standard-sized packets to avoid overloading lines of transmission with large chunks of data. Each of these packets is separately numbered and includes the Internet address of the destination. Upon arrival at the recipient computer, the protocol recombines the packets into the original message.