A B C D E F G H I L M N O P R S T U V W
This glossary defines some of the terms found in the documentation for Microsoft Proxy Server. Click a letter (above) to jump to that section of the glossary, or use your browsers Find command to search for a word across the entire glossary. For example, if you are running Microsoft Internet Explorer, from the Edit menu click Find and type in the word you are looking for.
An entry in an access control list (ACL) that specifies access rights for specific files and shares within Windows NT File System (NTFS) directories.
A listing of Access Control Entries specifying access rights to services and specified data files located within Windows NT File System (NTFS) directories.
A service mechanism used to initiate new requests to update cached file objects. Requests can be activated based on the length of time an object has been cached or was last retrieved from the objects source location. This type of caching can be used to assure the freshness of specified data within the cache. See also fresh data, stale data.
For the FTP service, a summary of the information in a given directory. This summary appears automatically to browsers.
This feature allows remote access to an Internet server computer. Remote users can connect to the computer without supplying a user name or password, but have only the guest permissions assigned to this account.
A process used to determine if a user has permission to access a resource or perform an operation.
A domain server used to replicate the master database for the domain. The master database contains centralized security data for all domain-assigned users and is updated when changes in security are made. See also Primary Domain Controller (PDC), member server.
Setting the maximum capacity that a service is allowed to use. You can deliberately limit a servers Internet workload by not allowing it to receive requests at full capacity, saving resources for other programs such as e-mail.
An authentication protocol supported by Internet Explorer. There is no encryption with this protocol.
The measure of speed at which data is transferred over a network.
A tool for navigating and accessing information on either the Internet or an intranet.
A store of files from a Web server copied locally for quicker access. Caching is configured for Web clients by selecting the View menu in Internet Explorer and choosing Cache Settings.
The degree to which cached data remains accurate in comparison to source information.
See also Intelligent TTL (Time-to-Live), object modification checking.
An accepted industry protocol standard for application-aware proxy services over HTTP-based client/server communications. The CERN standards are established by the Conseil Europeén pour la Recherche Nucléaire (European Laboratory for Particle Physics), located in Switzerland.
The structure of services that run on the Internet or an intranet. The client computer accesses the Web server, which supplies the client with resources or information not found on the clients own host. Also, CGI and ISAPI applications can do processing on the Web server and return results to the client.
Refers to the speed with which objects or URLs are added to the cache.
An interface used by an application that runs on a Web server when a client requests it.
Refers to a service that provides a managed connection allowing networked computers to communicate reliably. TCP and SPX protocols support this type of service. Features of this type of service include the following: data integrity checking, packet sequencing, and error correction. Also known as streamed service.
Refers to those network communications which emphasize broadcast methods and unacknowledged delivery. UDP is a protocol that supports this type of service. Supports higher throughput speeds for real-time applications. See also User Datagram Protocol (UDP).
A customized or personalized HTML document page that is assembled and returned by a Web server, based on information sent by the client .
A method of securing data transmissions to and from an Internet server.
A high-level security rating established and granted by the U.S. government.
Originally, a UNIX term used to describe a program that loads and waits continuously in the background for a request before executing. When a request is received, the program operates in the foreground, and once it has completed an execution, returns to the background and awaits further requests.
A way of preventing data from being altered in transit.
The name that allows a connection to an ODBC data source, such as an SQL database. You set this name by using the ODBC application in Control Panel.
Assuming the DNS name of another system by either corrupting a name-service cache, or by compromising a domain-name server for a valid domain.
For Windows NT Server, this is a collection of computers that share a common centralized domain database that administers access and establishes security policies. For the Internet, domains can also refer to a style of addressing on the Internet that uses the Domain Name System (DNS) to provide conventional names for Internet computers that can be mapped to IP addresses.
For a Windows NT Server domain, the server that authenticates domain logons and maintains the security policy and the master database for a domain. See also Backup Domain Controller (BDC), member server, Primary Domain Controller (PDC).
The ability to control access to specific Internet sites by denying or granting permission to access those sites.
A protocol and naming system used throughout the Internet to map Internet Protocol (IP) addresses to user-friendly names. DNS is sometimes referred to as the BIND service.
An industry-standard protocol that assigns Internet Protocol (IP) addresses to computers for temporary connected use on an IP network.
A way of making data indecipherable while it is being sent from computer to computer.
Connecting all files with a certain file name extension to a program. For example, through the Windows NT Explorer, all .txt files are associated by default with Notepad. In Internet Explorer, you can associate file name extensions with applications by use of the Helpers dialog box. To display this dialog box, from the View Menu, choose Helpers.
A TCP/IP-based standard protocol for sharing files between computers.
A feature of ISAPI that allows pre-processing of requests and post-processing of responses, permitting site-specific handling of Hyper-Text Transfer Protocol (HTTP) requests and responses.
A system, or combination of systems, that enforces a boundary between two or more networks and keeps intruders out of private networks.
Cached data that is verified to be current and consistent with its source. See also cache consistency, stale data.
A name that substitutes for an IP address, for example, www.microsoft.com instead of an IP address such as 157.45.60.81.
The process of removing unused or outdated object data from the cache.
A hardware or software device that directs network traffic between two separated networks. For example, Microsoft Proxy Server can act as a gateway between a private network (an intranet) and the public network (the Internet).
A hierarchical system for finding and retrieving information from the Internet or an intranet.
An enhanced version of Gopher, including a way of getting more information about an item (such as file size, last date of modification, and the administrators name); the ability to display a single file in multiple formats (such as regular text, rich text, and PostScript); a way to add a short description of the item; and the ability to ask a user to fill out a form to obtain an item.
All files available on a Gopher server for display by using the Gopher protocol.
In packet-level communications, a specified number of bytes that precedes the actual data being transmitted. It identifies control information used to deliver, route and process the data contents of a packet.
The percentage of client requests fulfilled through previously cached data, in contrast to the total of all client requests that have been processed by the caching service.
The root directory for a service, where the content files are stored. By default, the home directory and all its subdirectories are available to users.
Another name for a Web server, which uses HTTP for its primary means of communicating with clients and operates as a daemon-type process. See also daemon, Hypertext Transfer Protocol (HTTP).
A way of jumping to another place on the Internet. Hyperlinks usually appear in a different format from regular text. You initiate the jump to a new link by clicking the link.
Documents with links to other documents. Click a link to display the linked document.
The formatting language used for documents on the World Wide Web.
The underlying protocol by which WWW clients and servers communicate.
A connection to the Internet installed by your Internet service provider (ISP). A dial-up ISDN line can offer speeds up to 128,000 bps.
A method for optimizing caching service that extends cache life for those cache objects which are frequently requested. Each time an object is retrieved from the cache, this function sets a new increased TTL expiration value for the object based on a percentage of the objects remaining TTL within the cache.
A program written in C, Perl, or as a Windows NT batch file. The user initiates the program by clicking a hyperlink.
The global network of computers that communicate through a common set of protocols known collectively as TCP/IP. See also Transmission Control Protocol/Internet Protocol (TCP/IP).
The Microsoft Internet server product designed for implementing and managing content sites for TCP/IP-based networks and client access. Microsoft Proxy Server integrates fully with IIS and Microsoft Windows NT Server.
The agency that centrally coordinates assignment and registration of DNS names and IP addresses for use on the Internet. See also Domain Name System (DNS), Internet Protocol (IP) address.
The routing protocol part of TCP/IP that uses IP addressing to route messages from one Internet location to another. See also Internet Protocol (IP) address.
A unique address that identifies a host on a network. It identifies a computer as a 32-bit address that is unique across a TCP/IP network. An IP address is usually represented in dotted-decimal notation, which depicts each octet (eight bits, or one byte) of an IP address as its decimal value and separates each octet with a period, for example: 102.54.94.97.
A protocol that supports interactive text-based communications in established chat room sites on the Internet.
A Microsoft-developed specification for establishing procedural calls between Internet-based applications and the underlying operating system.
Public providers of remote connections to the Internet.
A routing protocol developed for Novell networks that is used in place of the Internet Protocol (IP) to manage communications access between network devices.
Any privately operated TCP/IP-based network (for example, a corporate network). Intranets can be connected to the Internet, but are usually protected by an intermediate set of barrier devices that secure Internet access. See also firewall.
See Internetwork Packet Exchange (IPX), Sequenced Packet Exchange (SPX).
See Internet Server Application Programming Interface (ISAPI).
A default account with anonymous logon privileges for accessing Internet-based services, such as FTP, WWW, and Gopher. This account is created during Microsoft Internet Information Server installation.
A high-capacity line (most often a telephone line) dedicated to network connections.
Refers to the concept of discarding cached data on the basis of frequency of use.
See hyperlink.
A text-based file that is used as a static routing table in Microsoft Windows NT Server to authenticate and register valid IP addresses and associated user-friendly domain names for IP nodes in a local TCP/IP network.
A group of computers that are linked together around a shared site and unified purpose.
A table of all internal IP address pairs on the private network where Microsoft Proxy Server is installed. This list is used to control access between clients on the internal network and remote IP addresses on external IP networks (or the Internet). The LAT is registered and stored in a text-based file (Msplat.txt) within the installed directory for Microsoft Proxy Server (C:\Msp\Clients). This file is distributed to clients during setup and updated periodically by Microsoft Proxy Server.
The file in which logging records are stored. This file can be either a text file or a database file.
Storing information about events that occurred on a firewall or network.
A standard database component that uses the Simple Network Management Protocol (SNMP) to communicate information about hardware and software processes on your network for further management and monitoring.
A server that has been assigned to a Windows NT domain, but is not designated as either the primary domain controller (PDC) or a backup domain controller (BDC) within the assigned domain. See also Primary Domain Controller (PDC), Backup Domain Controller (PDC).
Any measurable or significant factor that can be used in analyzing client/server-based communications.
A way of configuring browsers to view files that are in multiple formats.
A configuration that maps friendly names to IP addresses.
Refers to the caching of HTTP error conditions associated with accessing a particular URL. If the URL is unavailable, the error response message can be cached and returned to subsequent clients that request the same URL.
A protocol for reading messages posted in thousands of news groups on the Internet.
The code that periodically scans the cache for objects to be discarded. It deletes the cache files that have not been used recently, and therefore are unlikely to be used again in the near future.
A function of the caching service that performs a set of tests to verify if a cached object differs from the source object being requested. If a cached object is verified to be the same as it source, the cached object is returned. If a cached object is found to be different from its source, the source object is retrieved and the cache updated.
A standard specification for data storage and access that provides a means of interchange for tabled data across varying database systems.
A fixed number of bytes that forms the basic physical unit of distribution for all networked data transmissions.
See Web page.
Refers to the most common type of caching performed, frequently referred to as on-demand caching. In this type of service, data is cached and discarded entirely on the basis of object size, popularity, or time since the requested object was last updated in the cache. All caching updates are user-initiated in this type of caching.
See authentication.
A collection of services that enable a computer running Windows NT Workstation to publish a personal Web site from the desktop. The services include the WWW service, the FTP service, and the Gopher service.
In contrast to SLIP, a more recently established Internet communications protocol that standardizes dial-up networking using analog modem hardware and standard telephone lines. Although PPP is a well-standardized protocol, vendor implementations of PPP service can vary significantly.
Point-to-Point Tunneling Protocol (PPTP)
A newer networking protocol that remote users can use to access corporate networks securely across the Internet by dialing into an Internet Service Provider (ISP) or by connecting directly to the Internet. Because PPTP allows multiprotocol encapsulation, users can send any packet type over an IP network.
Conditions set by the system administrator, such as how quickly account passwords expire and how many unsuccessful logon attempts are allowed before a user is locked out. These policies manage accounts to prevent exhaustive or random password attacks.
A number identifying a certain Internet application. For example, the default port number for the Gopher service is 70, and for the WWW service it is 80.
A server assigned to administer security for a domain. This server stores the master database of all domain-assigned security data for users and must be updated when changes in security are made. See also Backup Domain Controller (BDC), member server.
A file that starts an application or program. A program file has an .exe, .pif, .com, .cmd, or .bat file name extension.
Software that allows computers to communicate over a network. The Internet protocol is TCP/IP.
A software program that connects a user to a remote destination through an intermediary gateway.
A client device that must use a proxy host to gain access to network services not directly supported for client usage.
A host device that acts as a relay agent between servers and clients to intercept requests and process communications on behalf of proxy clients.
A linked library that serves as an active in-process mechanism for extending Web server functionality by providing the following services: client authentication, domain filtering, cache searching for requested objects, retrieval of requested objects from the Internet as necessary, and updating cached data.
A linked library that is called by Microsoft Proxy Server (or a Web server) that determines if a client-initiated HTTP request is to be considered as a proxy request. If so, it is handled by the Web Proxy service and forwarded to the Proxy ISAPI application or, in the case of a non-proxy request, forwarded as a standard HTTP request.
A streaming audio protocol supported by Microsoft Proxy Server that provides continuous sound over the Internet to compatible clients. RealAudio Player can be configured to work with Internet Explorer.
A service that allows remote client computers (RAS clients) running MS-DOS, Microsoft Windows, or Windows NT to dial in to a network server (RAS server). RAS servers can also be configured to allow local client computers to dial out to servers outside a private network.
Administering a computer from another computer over the network.
A message-passing facility that allows a distributed application to call services available on various computers in a network.
Refers to the speed with which objects or URLs are taken from the cache.
A hardware or software device that directs network traffic. The Microsoft Proxy Server is installed behind a router within a private network environment (intranet).
A group of directives to an application or utility program. A CGI application, for example. See also Common Gateway Interface.
A protocol that supplies secure data communication through data encryption and decryption.
A transport-level protocol developed for use in Novell networks. SPX is used in place of the Transmission Control Protocol (TCP) to verify packet delivery, assure proper sequencing of packet data, and provide connected service between devices on a network. See also connected service, Internetwork Packet Exchange (IPX).
A well-established Internet communications protocol that standardizes dial-up networking.
The underlying protocol by which Microsoft Windows NT-based servers communicate critical service information with one another.
One of the services managed through the Internet Service Manager. These include the WWW, Gopher, and FTP services provided by Internet Information Server, and the Web Proxy and WinSock Proxy services provided by Microsoft Proxy Server.
A protocol used for exchanging mail on the Internet.
A standard protocol used to communicate management information for monitoring your network. See also Management Information Database (MIB).
A communications channel used by TCP/IP-aware applications. Sockets are data structures created by using a combination of device IP addresses and reserved TCP/UDP port numbers to indicate connection and delivery service information.
Cached data that is outdated or inconsistent in comparison to its source.
Refers to the accepted industry-standard protocol for application-aware services established by CERN. See also CERN-proxy protocol.
HTML pages prepared in advance of the request and sent to the client upon request. This page takes no special action when requested. See also interactive applications.
A TCP/IP configuration parameter that extracts network and host configuration from an IP address.
Files that contain information about files on a Gopher server. This information is sent to clients and it typically contains the file name, host name, and port number.
See Transmission Control Protocol/Internet Protocol (TCP/IP).
A standard field in a TCP/IP header that indicates an age-of-expiration value that is examined by receiving stations. Data with active TTL values is maintained and forwarded on the network; data with expired TTL values is discarded.
The main transport protocol within TCP/IP that manages reliable delivery of data between networked computers.
A family of networking protocols that allows computers to communicate across interconnected networks and the Internet. Every computer on the Internet supports TCP/IP.
A naming convention that uniquely identifies the location of a computer, directory, or file on the Internet. The URL also specifies the appropriate Internet protocol, such as Gopher, HTTP, and so on.
The most popular news-group hierarchy on the Internet.
A transmission-level protocol in TCP/IP networking that provides connection-less service for unacknowledged delivery of packeted data. See also connection-less service.
A stand-alone application that provides stream-oriented service for continuous video imaging. VDOLive Player can be configured to work with Internet Explorer.
A directory outside the home directory that appears to browsers as a subdirectory of the home directory. For any of the three services (WWW, Gopher or FTP), you can configure a virtual directory by using the Directories property sheet in Internet Service Manager.
Typically, files that the Web site administrator updates frequently.
A software program, such as Internet Explorer, that retrieves a document from a Web server, interprets the HTML codes, and displays the document to the user with as much graphical content as the software can supply.
A World Wide Web document. Pages can contain almost anything, such as news, images, movies, and sounds.
This service provides a means for Microsoft Proxy Server to act as a proxy host.
A computer equipped with the server software to respond to Web client requests, such as requests from a Web browser. A Web server uses the Internet HTTP, FTP, and Gopher protocols to communicate with clients on a TCP/IP network.
A network that extends across distance and is not confined to a single site. This type of network typically involves connecting multiple sites that use multiple physical topologies.
A protocol for mapping Internet Protocol (IP) addresses to user-friendly names. See also Domain Name System.
A method of authentication in which a server uses Windows NT security to allow access to its resources.
A standard specification for designing interprocess communications between computers running applications that utilize TCP/IP networking. See also socket.
This is an API service used by Microsoft Proxy Server that provides redirection and remote execution of Windows Sockets-compatible applications over connections involving a private intranet computer and remote computers on the Internet.
The most graphical service on the Internet. It provides sophisticated linking abilities.
© 1996 by Microsoft Corporation. All rights reserved.