Appendix A. Glossary
- ad hoc wireless network
A temporary network set up for collaborative sharing. Vista provides users the ability to set up this type of network via a peer‐to‐peer connection instead of using a wireless access point.
- access control model
The model for which access to certain tasks and functions are controlled.
- ActiveX
Microsoft object‐oriented programming tools. An ActiveX control is a component program object that can be reused by applications within a computer.
- Admin Approval mode
The default standard permission for all users logged into an administrative account.
- asymmetric encryption
A cryptographic system that uses two keys: a public and private key. The public key is provided to anyone who wants to send an encrypted message to the person who holds the private key. The person holding the private key can then decrypt the message.
- authentication
Determining whether someone (or something) is who he (it) says he (it) is. An example of this is the logon process, wherein a user supplies a username and password. If the user can provide the correct password, it's assumed that the user is valid.
- authorization
The process for which a user is given access to certain data or to perform a certain function.
- Backup and Restore Center
The Vista interface for tools used to perform backup and recovery of your system and data.
- BitLocker
The Vista disk‐encryption tool used to encrypt the system volume (that is, the
C
drive) of the hard disk. The tool, if used with a Trusted Platform Module (TPM), ...
Get Windows Vista Security For Dummies® now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.