Symantec 10521146 Administration Guide - Page 364

UUCP UNIX-to-UNIX, virtual network

Page 364 highlights

364 Glossary user account user authentication user identification user name user-level services UUCP (UNIX-to-UNIX Copy) uuencode validation vandal virtual network perimeter virus A file that contains information that identifies a user to the system. This information includes the user name and password, the groups in which the user account has membership, and the rights and permissions that the user has for using the system and accessing its resources. A process that verifies a user's identity to ensure that the person requesting access to the private network is, in fact, that person to whom entry is authorized. The process by which a user is identified to the system as a valid user (as opposed to authentication, which is the process of establishing that the user is indeed that user and has a right to use the system). A form of authentication that is in place to ensure that the user is authorized to use the services being requested. The user name also signifies the primary user or users of a particular computer. Commands or utilities such as ssh and syslog which are available from the underlying operating system. A set of UNIX programs for copying (sending) files between different UNIX systems and for sending commands to be executed on another system. A data encoding standard developed to translate or convert a file or email attachment (an image, text file, or program) from its binary or bit-stream representation into the 7-bit ASCII set of text characters. The process of checking a configuration for completeness, ensuring that all values are valid, and determining if all logical and physical references can be resolved. An executable file (usually an applet or an ActiveX control) associated with a Web page that is designed to be harmful, malicious, or at the very least inconvenient to the user. Because these applets or application programs can be embedded in any HTML file, they can also arrive as an email attachment or automatically as the result of being pushed to the user. Vandals can be viewed as viruses that can arrive over the Internet stuck to a Web page. Vandals are sometimes referred to as hostile applets. A network that appears to be a single protected network behind firewalls, but which actually encompasses encrypted virtual links over untrusted networks. A piece of programming code inserted into other programming to cause some unexpected and, for the victim, usually undesirable event. Viruses can be transmitted by downloading programming from other sites or present on a diskette. The source of the file you are downloading or of a diskette you have received is often unaware of the virus. The virus lies dormant until circumstances cause the computer to execute its code. Some viruses are playful in intent and effect, but some can be harmful, erasing data or causing your hard disk to require reformatting.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

364
Glossary
user account
A file that contains information that identifies a user to the system. This information
includes the user name and password, the groups in which the user account has
membership, and the rights and permissions that the user has for using the system and
accessing its resources.
user authentication
A process that verifies a user’s identity to ensure that the person requesting access to the
private network is, in fact, that person to whom entry is authorized.
user identification
The process by which a user is identified to the system as a valid user (as opposed to
authentication, which is the process of establishing that the user is indeed that user and
has a right to use the system).
user name
A form of authentication that is in place to ensure that the user is authorized to use the
services being requested. The user name also signifies the primary user or users of a
particular computer.
user-level services
Commands or utilities such as ssh and syslog which are available from the underlying
operating system.
UUCP (UNIX-to-UNIX
Copy)
A set of UNIX programs for copying (sending) files between different UNIX systems and
for sending commands to be executed on another system.
uuencode
A data encoding standard developed to translate or convert a file or email attachment (an
image, text file, or program) from its binary or bit-stream representation into the 7-bit
ASCII set of text characters.
validation
The process of checking a configuration for completeness, ensuring that all values are
valid, and determining if all logical and physical references can be resolved.
vandal
An executable file (usually an applet or an ActiveX control) associated with a Web page
that is designed to be harmful, malicious, or at the very least inconvenient to the user.
Because these applets or application programs can be embedded in any HTML file, they
can also arrive as an email attachment or automatically as the result of being pushed to
the user. Vandals can be viewed as viruses that can arrive over the Internet stuck to a Web
page. Vandals are sometimes referred to as hostile applets.
virtual network
perimeter
A network that appears to be a single protected network behind firewalls, but which
actually encompasses encrypted virtual links over untrusted networks.
virus
A piece of programming code inserted into other programming to cause some unexpected
and, for the victim, usually undesirable event. Viruses can be transmitted by downloading
programming from other sites or present on a diskette. The source of the file you are
downloading or of a diskette you have received is often unaware of the virus. The virus lies
dormant until circumstances cause the computer to execute its code. Some viruses are
playful in intent and effect, but some can be harmful, erasing data or causing your hard
disk to require reformatting.