Term
Application Compatibility Toolkit (ACT) |
|
Definition
a collection of programs that allow administrators to gather information about incompatibilities between specific applications and Windows 7 and create customized solutions that enable those applications to run. |
|
|
Term
Application control policies (AppLocker) |
|
Definition
a new Windows 7 feature that uses rules managed from a wizard-based interface. |
|
|
Term
Certification authority (CA) |
|
Definition
Distributes digital certificates containing public keys to web servers using Public Key Infrastructure (PKI). |
|
|
Term
|
Definition
Formerly known as a shim, it is a software component that sits between an application and the operating system. |
|
|
Term
|
Definition
A collection of compatibility fixs |
|
|
Term
|
Definition
allows Internet Explorer to properly display older pages. |
|
|
Term
|
Definition
a new feature of IE 8 that enables you to surf the Internet without leaving any record of your activities. |
|
|
Term
|
Definition
is a technique that takes social engineering to mass scale. Instead of convincing sounding telephone callers, phishing uses convincing-looking Web sites that urge users to supply personal information. |
|
|
Term
Program Compatibility Troubleshooter |
|
Definition
a wizard-based solution that users or administrators can use to automatically configure an executable file to use an appropriate Windows 7 compatibility mechanism. |
|
|
Term
|
Definition
is an operational state designed to prevent attackers who do penetrate the computer's defenses from accessing vital system components. |
|
|
Term
Public key infrastructure (PKI) |
|
Definition
A secure communication method that requires two encryption keys—a public one and a private one. Data encrypted using the public key can only be decrypted with the private key, and in the same way, data encrypted with the private key can only be encrypted using the public key. |
|
|
Term
|
Definition
a push technology that simplifies the process of delivering updated contented to designated users. |
|
|
Term
Secure Sockets Layer (SSL) |
|
Definition
the protocol that most Web sites use when establishing secure connections with clients over the Internet. |
|
|
Term
|
Definition
In Internet Explorer, a segment of the Internet or intranet assigned a particular level of security. The four levels are: Internet, Local Intranet, Trusted Sites, and Restricted Sites. |
|
|
Term
|
Definition
a software component that sits between an application and the operating system |
|
|
Term
|
Definition
examines traffic for evidence of phishing activity and displays a warning signs and to refrain from supplying confidential information to unknown parties. |
|
|
Term
|
Definition
a term that describes any attempt to penetrate the security of a system by convincing people to disclose secret information |
|
|
Term
Software restriction policies |
|
Definition
are Group Policy settings that enable administrators to specify the programs that are allowed to run on workstations bt creating rules of various types. |
|
|
Term
|
Definition
a free download that enables a computer running Windows 7 Professional, Enterprise, or Ultimate edition to create a virtual Windows XP machine on which you can run any native XP application. |
|
|