summaryrefslogtreecommitdiff
path: root/docs/htmldocs/Samba3-ByExample/go01.html
diff options
context:
space:
mode:
Diffstat (limited to 'docs/htmldocs/Samba3-ByExample/go01.html')
-rw-r--r--docs/htmldocs/Samba3-ByExample/go01.html115
1 files changed, 0 insertions, 115 deletions
diff --git a/docs/htmldocs/Samba3-ByExample/go01.html b/docs/htmldocs/Samba3-ByExample/go01.html
deleted file mode 100644
index 4365c9dbe0..0000000000
--- a/docs/htmldocs/Samba3-ByExample/go01.html
+++ /dev/null
@@ -1,115 +0,0 @@
-<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Glossary</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.75.2"><link rel="home" href="index.html" title="Samba-3 by Example"><link rel="up" href="index.html" title="Samba-3 by Example"><link rel="prev" href="apa.html" title="Appendix A.  GNU General Public License version 3"><link rel="next" href="ix01.html" title="Index"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Glossary</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="apa.html">Prev</a> </td><th width="60%" align="center"> </th><td width="20%" align="right"> <a accesskey="n" href="ix01.html">Next</a></td></tr></table><hr></div><div class="glossary" title="Glossary"><div class="titlepage"><div><div><h2 class="title"><a name="id394912"></a>Glossary</h2></div></div></div><dl><dt>Access Control List</dt><dd><p>
- A detailed list of permissions granted to users or groups with respect to file and network
- resource access.
- </p></dd><dt>Active Directory Service</dt><dd><p>
- A service unique to Microsoft Windows 200x servers that provides a centrally managed
- directory for management of user identities and computer objects, as well as the
- permissions each user or computer may be granted to access distributed network resources.
- ADS uses Kerberos-based authentication and LDAP over Kerberos for directory access.
- </p></dd><dt>Common Internet File System</dt><dd><p>
- The new name for SMB. Microsoft renamed the SMB protocol to CIFS during
- the Internet hype in the 1990s. At about the time that the SMB protocol was renamed
- to CIFS, an additional dialect of the SMB protocol was in development. The need for the
- deployment of the NetBIOS layer was also removed, thus paving the way for use of the SMB
- protocol natively over TCP/IP (known as NetBIOS-less SMB or <span class="quote">&#8220;<span class="quote">naked</span>&#8221;</span> TCP
- transport).
- </p></dd><dt>Common UNIX Printing System</dt><dd><p>
- A recent implementation of a high-capability printing system for UNIX developed by
- <a class="ulink" href="http://www.easysw.com/" target="_top">Easy Software Inc.</a>. The design objective
- of CUPS was to provide a rich print processing system that has built-in intelligence
- that is capable of correctly rendering (processing) a file that is submitted for
- printing even if it was formatted for an entirely different printer.
- </p></dd><dt>Domain Master Browser</dt><dd><p>
- The Domain Master Browser maintains a list of all the servers that
- have announced their services within a given workgroup or NT domain.
- </p></dd><dt>Domain Name Service</dt><dd><p>
- A protocol by which computer hostnames may be resolved to the matching IP address/es.
- DNS is implemented by the Berkeley Internet Name Daemon. There exists a recent version
- of DNS that allows dynamic name registration by network clients or by a DHCP server.
- This recent protocol is known as dynamic DNS (DDNS).
- </p></dd><dt>Dynamic Host Configuration Protocol</dt><dd><p>
- A protocol that was based on the BOOTP protocol that may be used to dynamically assign
- an IP address, from a reserved pool of addresses, to a network client or device.
- Additionally, DHCP may assign all network configuration settings and may be used to
- register a computer name and its address with a dynamic DNS server.
- </p></dd><dt>Group IDentifier</dt><dd><p>
- The UNIX system group identifier; on older systems, a 32-bit unsigned integer, and on
- newer systems, an unsigned 64-bit integer. The GID is used in UNIX-like operating systems
- for all group-level access control.
- </p></dd><dt>Key Distribution Center</dt><dd><p>
- The Kerberos authentication protocol makes use of security keys (also called a ticket)
- by which access to network resources is controlled. The issuing of Kerberos tickets
- is effected by a KDC.
- </p></dd><dt>Lightweight Directory Access Protocol</dt><dd><p>
- The Lightweight Directory Access Protocol is a technology that
- originated from the development of X.500 protocol specifications and
- implementations. LDAP was designed as a means of rapidly searching
- through X.500 information. Later LDAP was adapted as an engine that
- could drive its own directory database. LDAP is not a database per
- se; rather it is a technology that enables high-volume search and
- locate activity from clients that wish to obtain simply defined
- information about a subset of records that are stored in a
- database. LDAP does not have a particularly efficient mechanism for
- storing records in the database, and it has no concept of transaction
- processing nor of mechanisms for preserving data consistency. LDAP is
- premised around the notion that the search and read activity far
- outweigh any need to add, delete, or modify records. LDAP does
- provide a means for replication of the database to keep slave
- servers up to date with a master. It also has built-in capability to
- handle external references and deferral.
- </p></dd><dt>Local Master Browser</dt><dd><p>
- The Local Master Browser maintains a list of all servers that have announced themselves
- within a given workgroup or NT domain on a particular broadcast isolated subnet.
- </p></dd><dt>Media Access Control</dt><dd><p>
- The hard-coded address of the physical-layer device that is attached to the network.
- All network interface controllers must have a hard-coded and unique MAC address. The
- MAC address is 48 bits long.
- </p></dd><dt>NetBIOS Extended User Interface</dt><dd><p>
- Very simple network protocol invented by IBM and Microsoft. It is used to do NetBIOS
- over Ethernet with low overhead. NetBEUI is a non-routable protocol.
- </p></dd><dt>Network Address Translation</dt><dd><p>
- Network address translation is a form of IP address masquerading. It ensures that internal
- private (RFC1918) network addresses from packets inside the network are rewritten so
- that TCP/IP packets that leave the server over a public connection are seen to come only
- from the external network address.
- </p></dd><dt>Network Basic Input/Output System</dt><dd><p>
- NetBIOS is a simple application programming interface (API) invented in the 1980s
- that allows programs to send data to certain network names. NetBIOS is always run over
- another network protocol such as IPX/SPX, TCP/IP, or Logical Link Control (LLC).
- NetBIOS run over LLC is best known as NetBEUI (the NetBIOS Extended User Interface
- a complete misnomer!).
- </p></dd><dt>NetBT</dt><dd><p>
- Protocol for transporting NetBIOS frames over TCP/IP. Uses ports 137, 138, and 139.
- NetBT is a fully routable protocol.
- </p></dd><dt>NT/LanManager Security Support Provider</dt><dd><p>
- The NTLM Security Support Provider (NTLMSSP) service in Windows NT4/200x/XP is responsible for
- handling all NTLM authentication requests. It is the front end for protocols such as SPNEGO,
- Schannel, and other technologies. The generic protocol family supported by NTLMSSP is known as
- GSSAPI, the Generic Security Service Application Program Interface specified in RFC2078.
- </p></dd><dt>Server Message Block</dt><dd><p>
- SMB was the original name of the protocol spoken by Samba. It was invented in the 1980s
- by IBM and adopted and extended further by Microsoft. Microsoft renamed the protocol to
- CIFS during the Internet hype in the 1990s.
- </p></dd><dt>The Simple and Protected GSS-API Negotiation</dt><dd><p>
- The purpose of SPNEGO is to allow a client and server to negotiate a security mechanism for
- authentication. The protocol is specified in RFC2478 and uses tokens as built via ASN.1 DER.
- DER refers to Distinguished Encoding Rules. These are a set of common rules for creating
- binary encodings in a platform-independent manner. Samba has support for SPNEGO.
- </p></dd><dt>The Official Samba-3 HOWTO and Reference Guide, Second Edition</dt><dd><p>
- This book makes repeated reference to <span class="quote">&#8220;<span class="quote">The Official Samba-3 HOWTO and Reference Guide, Second
- Edition</span>&#8221;</span> by John H. Terpstra and Jelmer R. Vernooij. This publication is available from
- Amazon.com. Publisher: Prentice Hall PTR (August 2005),
- ISBN: 013122282.
- </p></dd><dt>User IDentifier</dt><dd><p>
- The UNIX system user identifier; on older systems, a 32-bit unsigned integer, and on newer systems,
- an unsigned 64-bit integer. The UID is used in UNIX-like operating systems for all user-level access
- control.
- </p></dd><dt>Universal Naming Convention</dt><dd><p>A syntax for specifying the location of network resources (such as file shares).
- The UNC syntax was developed in the early days of MS DOS 3.x and is used internally by the SMB protocol.
- </p></dd><dt>Wireshark</dt><dd><p>
- A network analyzer, also known as a network sniffer or a protocol analyzer. Formerly known as Ethereal, Wireshark is
- freely available for UNIX/Linux and Microsoft Windows systems from
- <a class="ulink" href="http://www.wireshark.org" target="_top">the Wireshark Web site</a>.
- </p></dd></dl></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="apa.html">Prev</a> </td><td width="20%" align="center"> </td><td width="40%" align="right"> <a accesskey="n" href="ix01.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Appendix A. 
- <acronym class="acronym">GNU</acronym> General Public License version 3
-  </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> Index</td></tr></table></div></body></html>