Active Accessibility
A COM-based mechanism that allows applications to actively cooperate with software tools running in the system, such as automation tools, testing tools, and accessibility aids used by people with disabilities.
Active Directory
Provides the ability to build applications that give a single point of access to multiple directories in a network environment, whether those directories are LDAP, NDS, or NTDS based directories.
ADM file
Administrative template file that specifies registry settings that can be modified through the Group Policy snap-in user interface. ADM files are extensible to allow ISVs and administrators to create custom Group Policy.
Advertisement
When the files for an application are shown as being available, but are not actually installed.
CSIDL
These values provide a unique system-independent way to identify special folders. Used in conjunction with SHGetFolderPath and other APIs.
Componentization
Process by which resources are grouped into Windows Installer Components.
Core Files
Also called core components. Core files are operating system DLLs and EXEs that developers depend on for the proper functionality of their applications. These files should not be uninstalled, as doing so could break other applications.
The core component list exists for historical reasons and is maintained to ensure compatibility with legacy applications. Microsoft will add no new files to this list. On Windows 2000 and later, applications should rely on System File Protection. For the list of core files, see http://msdn.microsoft.com/winlogo/.
Degrade gracefully
Does not crash the operating system (GPF or blue screen). A dialog box or other visual and audio cue appears informing the user, for example, that the functionality is not available on X version of Y operating system. User is not required to close the application, and can continue to use the other functionality.
Down-level operating system
Any combination of these three operating systems: Windows 95, Windows 98, or Windows NT Workstation 4.0.
Extension server
Executable that is associated with a file extension.
Group Policy
Used to specify settings for groups of users and computers, including software policies, scripts, user documents and settings, application deployment, and security settings.
High Contrast support
An option set by the user indicating that they require a high degree of contrast to improve screen legibility. Some application features may be exempted, such as when the use of color is intrinsic and indispensable to the goal of the feature.
HKCU
short for HKEY_CURRENT_USER
HKLM
short for HKEY_LOCAL_MACHINE
IntelliMirror
A set of management technologies that mirror systems, data, and applications on a server. Part of the Zero Administration initiative for Windows (ZAW).
long file name (LFN)
Any file name that exceeds 8.3 characters in length or contains any lowercase character or any character that is not valid in the 8.3 namespace.
Resources
In Windows Installer service, files (as defined by the file name and install location), registry keys, shortcuts, and anything else that needs to be installed/uninstalled to the computer.
Secure Windows Environment
A configuration that prevents unprivileged Users from intentionally or accidentally compromising the operating system. This is defined as the environment exposed to a normal (non-admin\non-power) User by default on a clean-installed NTFS system. In this environment, Users can only write to three* specific locations:
(HKEY_CURRENT_USER)**
(CSIDL_COMMON_DOCUMENTS)***
Users have Read-Only access to the rest of the system.
*Applications are free to modify the default security for an application-specific subdirectory of CSIDL_COMMON_APPDATA provided the modification is documented in the vendor questionnaire. This may provide a fourth location for Users to write to for a given application.
**Users cannot write to the following sections of HKCU:
\Software\Policies
\Software\Microsoft\Windows\CurrentVersion\Policies
***By default, Users cannot write to other Users shared documents, they can only read other Users shared documents. Applications are free to modify this default security on an application-specific subdirectory of CSIDL_COMMON_DOCUMENTS provided the modification is documented in the vendor questionnaire.
Side-by-side sharing
A new form of sharing in Windows 2000 and Windows 98 Second Edition that enables multiple versions of the same DLL to run at the same time.
System caret
Normally the flashing vertical bar that indicates the insertion point in text, it can actually have a range of appearances and is used to indicate keyboard focus location to other software utilities.
universal naming convention (UNC)
The system for indicating names of servers and computers, such as \\Servername\Sharename.
user profile
A computer-based record maintained about an authorized user of a multi-user computer system. A user profile is needed for security and other reasons; it can contain such information as the user's access restrictions, mailbox location, type of terminal, and so on.
Windows Installer service
Provides end users with a way to install and remove applications, or components of software as needed. System administrators can more easily manage applications and support roaming users.
Endnote 1. When testing in an NT 4.0 environment, Security Configuration Manager should be used to configure the NT 4.0 systems in a secure manner that is consistent with the Windows 2000 defaults. After installing Windows NT 4.0 and the proper service pack, install the command line version of the Security Configuration Manager and configure the system using the w2kdefsec.inf security template available at http://msdn.microsoft.com/winlogo/. Further instructions for applying this security template are available on the website.
--------------------------------------------
This document is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. Information in this document is subject to change without notice. The entire risk of the use or the results of the use of this document remains with the user.
The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real individual, company, product, or event, unless otherwise noted. Complying with all applicable copyright laws is the responsibility of the user.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in a written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
Active Accessibility, Active Desktop, Active Directory, IntelliMirror, Microsoft, Microsoft Press, MSDN, Outlook, Windows, the Windows logo, Win32, Win64, and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Other product and company names mentioned herein may be the trademarks of their respective owners.