Symantec 10521146 Administration Guide - Page 353

ODBC Open Database, are MacOS, Windows, DOS, and Linux.

Page 353 highlights

Glossary 353 node, standby The secondary node or nodes in a watchdog process or failover group. Standby nodes monitor traffic flows on designated network devices, but do not log data unless the active node fails. Standby nodes wait until the active node is out of commission before becoming active. notification An automatic alert message that notifies a security administrator that an event or error has occurred, or a predefined response that is triggered by a system condition, such as an event or error condition. Typical responses include sound or visual signals, such as displaying a message box, sending email, or paging a security administrator. The security administrator may be able to configure the response. object A graphical representation of a device or entity on your network with a unique address. You can create objects to represent network or Network Security devices such as servers or routers, as well as entities such as network segments or interfaces. The Network Security console displays objects in the topology tree on the Devices tab. ODBC (Open Database Connectivity) A standard or open application programming interface (API) for accessing a database. By using ODBC statements in a program, you can access files in a number of different databases, including Access, dBase, DB2, Excel, and Text. In addition to the ODBC software, a separate module or driver is needed for each database to be accessed. one-time password In network security, a password that is issued only once as a result of a challenge-response authentication process. This cannot be stolen or reused for unauthorized access. online The state of being connected to the Internet. When a user is connected to the Internet, the user is said to be online. OOBA (out-of-band authentication) A one-size-fits-all authentication sequence for protocols that require transparency or have their own authentication. OOBA allows you to authenticate with proxies, such as HTTP, SQLnet, and h323, that have not supported authentication on the firewall in the past. open source code A program whose source code is available for public inspection and revision. Open source software is often distributed freely, in the hope that the computing community will contribute to the program, helping to identify and eliminate bugs. Two well-known examples of open source programs are the Apache Web server and the Linux operating system. OS (operating system) The interface between the hardware of the computer and applications (for example a word-processing program). For personal computers, the most popular operating systems are MacOS, Windows, DOS, and Linux. packet A unit of data that is formed when a protocol breaks down messages that are sent along the Internet or other networks. Messages are broken down into standard-sized packets to avoid overloading lines of transmission with large chunks of data. Each of these packets is separately numbered and includes the Internet address of the destination. Upon arrival at the recipient computer, the protocol recombines the packets into the original message.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

353
Glossary
node, standby
The secondary node or nodes in a watchdog process or failover group. Standby nodes
monitor traffic flows on designated network devices, but do not log data unless the active
node fails. Standby nodes wait until the active node is out of commission before becoming
active.
notification
An automatic alert message that notifies a security administrator that an event or error
has occurred, or a predefined response that is triggered by a system condition, such as an
event or error condition. Typical responses include sound or visual signals, such as
displaying a message box, sending email, or paging a security administrator. The security
administrator may be able to configure the response.
object
A graphical representation of a device or entity on your network with a unique address.
You can create objects to represent network or Network Security devices such as servers or
routers, as well as entities such as network segments or interfaces. The Network Security
console displays objects in the topology tree on the Devices tab.
ODBC (Open Database
Connectivity)
A standard or open application programming interface (API) for accessing a database. By
using ODBC statements in a program, you can access files in a number of different
databases, including Access, dBase, DB2, Excel, and Text. In addition to the ODBC
software, a separate module or driver is needed for each database to be accessed.
one-time password
In network security, a password that is issued only once as a result of a challenge-response
authentication process. This cannot be stolen or reused for unauthorized access.
online
The state of being connected to the Internet. When a user is connected to the Internet, the
user is said to be online.
OOBA (out-of-band
authentication)
A one-size-fits-all authentication sequence for protocols that require transparency or
have their own authentication. OOBA allows you to authenticate with proxies, such as
HTTP, SQLnet, and h323, that have not supported authentication on the firewall in the
past.
open source code
A program whose source code is available for public inspection and revision. Open source
software is often distributed freely, in the hope that the computing community will
contribute to the program, helping to identify and eliminate bugs. Two well-known
examples of open source programs are the Apache Web server and the Linux operating
system.
OS (operating system)
The interface between the hardware of the computer and applications (for example a
word-processing program). For personal computers, the most popular operating systems
are MacOS, Windows, DOS, and Linux.
packet
A unit of data that is formed when a protocol breaks down messages that are sent along
the Internet or other networks. Messages are broken down into standard-sized packets to
avoid overloading lines of transmission with large chunks of data. Each of these packets is
separately numbered and includes the Internet address of the destination. Upon arrival at
the recipient computer, the protocol recombines the packets into the original message.