Wednesday, March 25, 2009

L2TP

L2TP (Layer 2 Tunneling Protocol)
An industry-standard Internet tunneling protocol. Unlike Point-to-Point Tunneling Protocol (PPTP), L2TP does not require IP connectivity between the client workstation and the server. L2TP requires only that the tunnel medium provide packet-oriented point-to-point connectivity. The protocol can be used over media such as ATM, Frame Relay, and X.25. L2TP provides the same functionality as PPTP. Based on Layer 2 Forwarding (L2F) and PPTP specifications, L2TP allows clients to set up tunnels across intervening networks.
See also: Asynchronous Transfer Mode (ATM); Internet Protocol (IP); Point-to-Point Tunneling Protocol (PPTP); tunnel

KEYBOARDLAYOUT

keyboard layout
The arrangement that accommodates the special characters and symbols used in different languages. Keyboard layouts affect which characters appear when you press the keys on your keyboard. After you change your keyboard layout, the characters that appear on your screen may no longer correspond to the characters that are printed on your keyboard keys.

KEY DISTRIBUTIO CENTER, KEYBOARD LANGUAGE

Key Distribution Center (KDC)
A network service that supplies session tickets and temporary session keys used in the Kerberos V5 authentication protocol. In Windows 2000 and Windows XP, the KDC runs as a privileged process on all domain controllers.
See also: ticket-granting ticket (TGT); Kerberos?V5 authentication protocol; ticket-granting service (TGS)
keyboard language
The language you want to use when you type. Some programs that are designed for the Windows platform recognize this setting. When you add a new keyboard language, a keyboard layout for that language is also added.

KERNEL, KEY

kernel
The core of layered architecture that manages the most basic operations of the operating system and the computer's processor. The kernel schedules different blocks of executing code, called threads, for the processor to keep it as busy as possible and coordinates multiple processors to optimize performance. The kernel also synchronizes activities among Executive-level subcomponents, such as I/O Manager and Process Manager, and handles hardware exceptions and other hardware-dependent functions. The kernel works closely with the hardware abstraction layer.
key
In Registry Editor, a folder that appears in the left pane of the Registry Editor window. A key can contain subkeys and value entries. For example, Environment is a key of HKEY_CURRENT_USER.
In IP security (IPSec), a value used in combination with an algorithm to encrypt or decrypt data. Key settings for IP security are configurable to provide greater security.
See also: registry; subkey

KERBEROS

Kerberos?V5 authentication protocol
An authentication mechanism used to verify user or host identity. The Kerberos V5 authentication protocol is the default authentication service for Windows 2000. Internet Protocol security (IPSec) and the QoS Admission Control Service use the Kerberos protocol for authentication.See also: Key Distribution Center (KDC); realm; service ticket; ticket-granting service (TGS); ticket-granting ticket (TGT)

JUNCTION POINT

junction point
A physical location on a hard disk that points to data located at another location on your hard disk or another storage device. Junction points are created when you create a mounted drive. You can also create a junction point using the linkd command.
See also: mounted drive

JOB OBJECT

job object
A system-level structure that allows processes to be grouped together and managed as a single unit.
See also: process
journal queue
For Message Queuing, a queue where journal messages are stored.
See also: journal quota; Message Queuing; source journaling; target journaling
journal quota
For Message Queuing, a property that specifies the cumulative limit for journal messages in a journal queue. The limit is based on cumulative journal message size. When a journal queue's quota is reached, messages are no longer stored.
See also: journal queue; Message Queuing

ICON

icon
A small image displayed on the screen to represent an object that can be manipulated by the user. Icons serve as visual mnemonics and allow the user to control certain computer actions without having to remember commands or type them at the keyboard.
IEEE 1394
A standard for high-speed serial devices such as digital video and digital audio editing equipment.
See also: device
IEEE 1394 connector
A type of connector that enables you to connect and disconnect high-speed serial devices. An IEEE 1394 connector is usually on the back of your computer near the serial port or the parallel port.
If a device is IEEE 1394 compatible, you can connect the device to the IEEE 1394 connector while the computer is running and Windows will detect the device and inform you when it is ready for use. Similarly, you can unplug the device while the computer is running, but you should use the Add Hardware Wizard to inform Windows that you are unplugging the device. Windows will then inform you when the device can be unplugged from the computer.
The IEEE 1394 bus is used primarily to connect high-end digital video and digital audio devices to your computer; however, some hard disks, printers, scanners, and DVD drives can also be connected to your computer using the IEEE 1394 connector.
IIS Server Instance resource
A server-instance designation used with Internet Information Services (IIS) that supports the WWW and FTP services. IIS server instances are supported as cluster resources by a Resource DLL. IIS Server Instance resources may have dependencies on IP Address resources, Network Name resources, and Physical Disk resources. Access information for server instances does not fail over.
See also: dependency; failover; Resource DLL
Image Name
The name of a process as displayed in Task Manager.
See also: Task Manager
import media pool
A logical collection of data-storage media that has not been cataloged by Removable Storage. Media in an import media pool should be cataloged as soon as possible so that they can be used by an application.
See also: media pool; Removable Storage
in-addr.arpa domain
A special top-level DNS domain reserved for reverse mapping of IP addresses to DNS host names.
See also: Domain Name System (DNS); reverse lookup; top-level domains
incremental backup
A backup that copies only those files created or changed since the last normal or incremental backup. It marks files as having been backed up (in other words, the archive attribute is cleared). If you use a combination of normal and incremental backups to restore your data, you will need to have the last normal backup and all incremental backup sets.
See also: copy backup; daily backup; differential backup; normal backup
incremental zone transfer (IXFR)
An alternate query type that can be used by some DNS servers to update and synchronize zone data when a zone is changed. When incremental zone transfer is supported between DNS servers, servers can keep track of and transfer only those incremental resource record changes between each version of the zone.
See also: DNS Server; secondary master; zone; zone transfer
independent client
A computer with Message Queuing installed that can host queues and store messages locally. Independent clients do not require synchronous access to a Message Queuing server to send and receive messages, but they can use Message Queuing servers with routing enabled for efficient message routing.
See also: dependent client; Message Queuing server; routing services
infrared (IR)
Light that is beyond red in the color spectrum. While the light is not visible to the human eye, infrared transmitters and receivers can send and receive infrared signals.
See also: Infrared Data Association (IrDA); infrared device; infrared port
Infrared Data Association (IrDA)
The industry organization of computer, component, and telecommunications vendors who establish the standards for infrared communication between computers and peripheral devices, such as printers.
See also: infrared (IR)
infrared device
A computer, or a computer peripheral such as a printer, that can communicate using infrared light.
See also: infrared (IR)
infrared file transfer
Wireless file transfer between a computer and another computer or device using infrared light.
See also: infrared (IR)
infrared network connection
A direct or incoming network connection to a remote access server using an infrared port.
See also: infrared port
infrared port
An optical port on a computer that enables communication with other computers or devices by using infrared light, without cables. Infrared ports can be found on some portable computers, printers, and cameras.
See also: infrared (IR); infrared device; port
infrastructure master
The domain controller assigned to update group-to-user references whenever group memberships are changed, and to replicate these changes to any other domain controllers in the domain. At any time, there can be only one infrastructure master in a particular domain.
See also: domain controller; multimaster replication; operations master
inheritance
A mechanism that allows a given access control entry (ACE) to be copied from the container where it was applied to all children of the container. Inheritance can be combined with delegation to grant administrative rights to a whole subtree of the directory in a single update operation.
See also: access control entry (ACE); delegation
inherited permissions
Permissions on an object that are automatically inherited from its parent object. Inherited permissions cannot be modified.
See also: permission; object; parent object
Initial master
A shared folder whose existing files and folders are replicated to other shared folders when replication is initially configured. After replication is complete, there is no initial master, since any of the replicas can accept changes and propagate them to the other replicas. The initial master then becomes another replica.
See also: shared folder; replica; replication
initialize
In Disk Management, the process of detecting a disk or volume and assigning it a status (for example, healthy) and a type (for example, dynamic).
See also: basic disk; basic volume; dynamic disk; dynamic volume
Initiate to Application Enable
When checked, new connections to the DDE share are allowed. When cleared, only current DDE conversations are allowed.
Ink
An option that allows you to enter text in handwritten form. Instead of converting your handwritten text to typed text, the text is converted to an object and displayed exactly as you wrote it. For example: .
input language
The specification of the language you want to type in. Some programs that are designed for Windows recognize this setting. When you add a new input language, a keyboard layout for that language is also added.
Input Method Editor (IME)
Programs used to enter the thousands of different characters in written Asian languages with a standard 101-key keyboard. An IME consists of both an engine that converts keystrokes into phonetic and ideographic characters and a dictionary of commonly used ideographic words. As the user enters keystrokes, the IME engine attempts to identify which character or characters the keystrokes should be converted into.
input/output (I/O) port
A channel through which data is transferred between a device and the microprocessor. The port appears to the microprocessor as one or more memory addresses that it can use to send or receive data.
See also: device; memory address; port
insertion point
The place where text will be inserted when typed. The insertion point usually appears as a flashing vertical bar in an application's window or in a dialog box.
install
When referring to software, to add program files and folders to your hard disk and related data to your registry so that the software runs properly. Installing contrasts with upgrading, where existing program files, folders, and registry entries are updated to a more recent version.
When referring to hardware, to physically connect the device to your computer, to load device drivers onto your computer, and to configure device properties and settings.
See also: device driver; registry; uninstall
integrated device electronics (IDE)
A type of disk-drive interface in which the controller electronics reside on the drive itself, eliminating the need for a separate adapter card. IDE offers advantages such as look-ahead caching to increase overall performance.
Integrated Services Digital Network (ISDN)
A digital phone line used to provide higher bandwidth. ISDN in North America is typically available in two forms: Basic Rate Interface (BRI) consists of 2 B-channels at 64 kilobits per second (Kbps) and a D-channel at 16 Kbps; Primary Rate Interface (PRI) consists of 23 B-channels at 64 Kbps and a D-channel at 64 Kbps. An ISDN line must be installed by the phone company at both the calling site and the called site.
See also: B-channel; D-channel; multilink dialing; Service Profile Identifier (SPID); switch type
interactive dialog box
A dialog box that requires a response from the user. Intermediary devices such as a security host require such a dialog box as an added layer of security between the client and the remote access server. In such dialog boxes, the user types an access code or a user name and password on the remote access terminal screen.
See also: dialog box; intermediary device; remote access server; static dialog box
interactive logon
A network logon from a computer keyboard, when the user types information in the Logon Information dialog box displayed by the computer's operating system.
interconnect
A private network that connects nodes in a cluster.
See also: cluster
intermediary device
A device other than a modem or X.25 PAD, located between a network connection and the remote access server. This device is typically a modem-pool switch or security host and requires either a static or interactive dialog box between the client and itself.
See also: remote access server; static dialog box; interactive dialog box; PAD (packet assembler/disassembler)
internal network number
A 4-byte hexadecimal number used for addressing and routing purposes. The internal network number identifies a virtual network inside a computer. The internal network number must be unique to the IPX internetwork. Internal network number is also called virtual network number.
See also: external network number; Internetwork Packet Exchange (IPX)
international prefix
Digits dialed before the country code to access the international phone service. The actual digits depend on the country or region in which you are dialing an international number. For example, in the United States of America, the prefix for international dialing is 011. To dial from the United States of America to Honduras, which has the country code 504, you would dial: (011) (504) (000) 000-0000
International Telecommunication Union - Telecommunication [Standardization Sector] (ITU-T)
The sector of the International Telecommunication Union (ITU) responsible for telecommunication standards. ITU-T replaces the Comite Consultatif International Telegraphique et Telephonique (CCITT). Its responsibilities include standardizing modem design and operations, and standardizing protocols for networks and facsimile transmission. ITU is an international organization within which governments and the private sector coordinate global telecom networks and services.
internet
internet. Two or more network segments connected by routers. Another term for internetwork.
Internet. A worldwide network of computers. If you have access to the Internet, you can retrieve information from millions of sources, including schools, governments, businesses, and individuals.
See also: World Wide Web
Internet address
An address for a resource on the Internet that is used by Web browsers to locate Internet resources. An Internet address typically starts with a protocol name, followed by the name of the organization that maintains the site; the suffix identifies the kind of organization it is. For example, the address http://www.yale.edu/ provides the following information:
http: This Web server uses the Hypertext Transfer Protocol.
www: This site is on the World Wide Web.
edu: This is an educational institution.
Internet address is also called Uniform Resource Locator (URL).
See also: Web server; protocol
Internet Control Message Protocol (ICMP)
A required maintenance protocol in the TCP/IP suite that reports errors and allows simple connectivity. ICMP is used by the Ping tool to perform TCP/IP troubleshooting.
See also: Internet Protocol (IP); protocol; Transmission Control Protocol/Internet Protocol (TCP/IP)
Internet Engineering Task Force (IETF)
An open community of network designers, operators, vendors, and researchers concerned with the evolution of Internet architecture and the smooth operation of the Internet. Technical work is performed by working groups organized by topic areas (such as routing, transport, and security) and through mailing lists. Internet standards are developed in IETF Requests for Comments (RFCs), which are a series of notes that discuss many aspects of computing and computer communication, focusing on networking protocols, programs, and concepts.
See also: subnet bandwidth management (SBM); Session Description Protocol (SDP)
Internet Group Management Protocol (IGMP)
A protocol used by IP hosts to report their multicast group memberships to any immediately neighboring multicast routers.
See also: Internet Protocol multicasting; protocol
Internet Information Services (IIS)
Software services that support Web site creation, configuration, and management, along with other Internet functions. Internet Information Services include Network News Transfer Protocol (NNTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP).
See also: Simple Mail Transfer Protocol (SMTP); File Transfer Protocol (FTP); Network News Transfer Protocol (NNTP)
Internet Protocol (IP)
A routable protocol in the TCP/IP protocol suite that is responsible for IP addressing, routing, and the fragmentation and reassembly of IP packets.
See also: Compression Control Protocol (CCP); packet; Transmission Control Protocol/Internet Protocol (TCP/IP); voluntary tunnel
Internet Protocol multicasting
The extension of local area network multicasting technology to a TCP/IP network. Hosts send and receive multicast datagrams, the destination fields of which specify IP host group addresses rather than individual IP addresses. A host indicates that it is a member of a group by means of the Internet Group Management Protocol (IGMP).
See also: Internet Group Management Protocol (IGMP); Transmission Control Protocol/Internet Protocol (TCP/IP)
Internet Protocol security (IPSec)
A set of industry-standard, cryptography-based protection services and protocols. IPSec protects all protocols in the TCP/IP protocol suite and Internet communications using L2TP.
Internet service provider (ISP)
A company that provides individuals or companies access to the Internet and the World Wide Web. An ISP provides a telephone number, a user name, a password, and other connection information so users can connect their computers to the ISP's computers. An ISP typically charges a monthly or hourly connection fee.
See also: Web server
Internetwork Packet Exchange (IPX)
A network protocol native to NetWare that controls addressing and routing of packets within and between LANs. IPX does not guarantee that a message will be complete (no lost packets).
See also: Compression Control Protocol (CCP); IPX/SPX; local area network (LAN); Routing Information Protocol over IPX (RIPX)
interrupt
A request for attention from the processor. When the processor receives an interrupt, it suspends its current operations, saves the status of its work, and transfers control to a special routine known as an interrupt handler, which contains the instructions for dealing with the particular situation that caused the interrupt.
interrupt request (IRQ) lines
Hardware lines over which devices can send signals to get the attention of the processor when the device is ready to accept or send information. Each device must have a unique IRQ line.
See also: device
intersite messaging service (ISM)
A service that supports transports for asynchronous, site-to-site messaging. Each transport serves two major roles: send/receive and topology queries (such as, what are the various sites connected by this transport, and at what cost?). The intersite messaging services shipped in Windows are RPC and SMTP (mail).
See also: remote procedure call (RPC); service; Simple Mail Transfer Protocol (SMTP)
intranet
A network within an organization that uses Internet technologies and protocols, but is available only to certain people, such as employees of a company. An intranet is also called a private network.
IP address
A 32-bit address used to identify a node on an IP internetwork. Each node on the IP internetwork must be assigned a unique IP address, which is made up of the network ID, plus a unique host ID. This address is typically represented with the decimal value of each octet separated by a period (for example, 192.168.7.27). In this version of Windows, you can configure the IP address statically or dynamically through DHCP.
See also: Dynamic Host Configuration Protocol (DHCP); IP Address resource; scope
IP Address resource
A 32-bit number in dotted decimal format that represents an Internet Protocol (IP) address and is supported as a cluster resource by a Resource DLL provided with Windows.
See also: IP address; Resource DLL
IPX/SPX
Transport protocols used in Novell NetWare networks, which together correspond to the combination of TCP and IP in the TCP/IP protocol suite. Windows implements IPX through NWLink.
See also: NWLink; Transmission Control Protocol/Internet Protocol (TCP/IP); Internetwork Packet Exchange (IPX)
ISA expansion slot
A connection socket for a peripheral designed to the Industry Standard Architecture (ISA) on a computer motherboard.
ISDN (Integrated Services Digital Network)
A high-speed digital telephone service that can dramatically increase the speed at which you connect to the Internet or to your corporate LAN (local area network). ISDN can operate at 128 kilobytes per second (Kbps), which is five or more times faster than many analog modems.
ISP (Internet service provider)
See definition for: Internet service provider (ISP)
Itanium
An Intel microprocessor that uses explicitly parallel instruction set computing and 64-bit memory addressing.

Disk management

Disk management
Fix a problem:
Troubleshooting Disk Management
Pick a task:
Disk Management: how to...
Overviews, Articles, and Tutorials:
Disk Management overview

Remote Assistance
Pick a task:
Adjust the sound quality
Set the maximum amount of time all Remote Assistance invitations can remain open
Talk by means of Remote Assistance
Prevent remote control of this computer by someone using Remote Assistance
Overviews

Getting system information
Pick a task:
Display system data
Find system data
Open a System Information file

Removable Storage
Fix a problem:
Removable Storage troubleshooting
Overviews, Articles, and Tutorials:
Remote Assistance
Pick a task:
Adjust the sound quality
Set the maximum amount of time all Remote Assistance invitations can remain open
Talk by means of Remote Assistance
Prevent remote control of this computer by someone using Remote Assistance
Digital signatures
Pick a task:
Verify that system files have a digital signature
Check the digital signatures for system or non-system files
Set file signature verification options
Overviews

Protect your files from viruses

Computer viruses and other forms of malicious code are a significant threat to the data stored on your new PC. The most effective strategy to protect your data from infection or destruction is to always run an anti-virus program and keep the virus definition files current

Visiter

free counters