Windows Vista operating system glossary Overview

Source: Internet
Author: User
Tags tpm chip

Many of my friends have suggested that they do not know much about some of the technical terms of the system. We have summarized a number of commonly used words to explain them one by one.
Access control list (ACL)

The access control list stores the information about who and what target can be entered.
And who is authorized to perform the operation.

ActiveX

A technology developed by Microsoft is a combination of OLE and COM (OLE, object link and embedding; COM, Component Object Model), allowing Web developers to establish interactive web pages, and provides the same functions as Java applets.

Ad hoc wireless network

Ad hoc wireless networks. A 802.11 Wi-Fi network that operates on a computer rather than a wireless access point (WAP ).

Admin Approval Mode

Manage the Approval mode. Vista is set by default when the majority of programs are run with standard user permissions. Even if you log on with a system administrator account, you must upgrade the permissions to improve the permission level when necessary.

Aero

The new user interface of Windows Vista is not used for entry edition and Home Basic edition.

Aero Glass

The Aero interface is the most popular graphic interface. It provides 3D animation, transparency, and other visual effects, but requires a high level of system resources, as well as a graphics card compatible with directx 9.

Anti-spyware

Anti-Spyware. Use pre-defined files and heuristic logic to detect known or potential spyware on your computer and warn users to remove or isolate the spyware.

Aveon

See "Windows Presentation Foundation" (WPF ).

Bcdedit

A command line tool in Windows Vista is used to create and reconfigure bootloader, which does not need to use the boot. ini file.

BitLocker

A security feature provided in Windows Vista Enterprise Edition and advanced Edition allows you to encrypt the entire operating system volume using a TPM chip or a USB key disk.

Custom Scan

Custom scan. The protection program only scans the specified location.

Defender

Protection Program (you can view Windows Defender)

Desktop Search

Desktop Search. A built-in function in Windows Vista allows you to search for files based on the file name (or part of the file name), date, author, and many other attributes, you can directly go to the "Start Menu.

Desktop Windows Manager (DWM)

Desktop window manager. A Windows Vista window system that supports Aero (apart from entry edition and Home Basic edition) to process how to sketch the content on the screen.

Encrypting File System (EFS)

Encrypted File System (EFS ). A digital authentication-Based Encryption Method built into Windows 2000, XP, 2003, and Vista. It allows users to encrypt only a single file or folder, to protect the confidentiality of data.

Exceptions

. Data packets that are not blocked by Windows firewalls, programs, services, or ports are free of access.

File/registry virtualization

File/Registry virtualization. A new function allows a program to view only part of the resources it is trying to modify.

Firewall profiles

Firewall configuration file. Different firewall configurations are used in different cases. For example, a configuration file may be used to connect to the company network, while the other is used to connect to the home network, the third is used to connect to a wireless hotspot in a public place.

Flip/3D flip

The all-new window management function in Windows Vista allows you to use [Alt] [Tab] to flip between opened Windows. If you use 3D flip, you can use the Windows key plus the TAB key to flip on the stack of a 3D running window, using the scroll wheel or trackball on the mouse, it can also achieve the flip effect.

Full Scan

Full check. One Protection Program option to search for all files and folders on the entire computer (including files and folders on all hard disks ).

Heuristics

Heuristic logic. In the content of the protection program, there is a way to determine whether a program is more like a spyware Based on the program's behavior and key pattern before the program is finally confirmed by the relevant definition.

ICMP

ICMP is an Internet Control Message Protocol used for Error Reporting and debugging. ICMP responds to the request and the reply message used by the popular Ping command.

Internet Explorer 7

The seventh version of Internet Browser IE. Provides a new Web browser (now available for Windows XP) in Windows Vista to provide tagged browsing, new security mechanisms, and many other enhancements.

Internet Explorer Protected Mode

IE 7 protection mode. A new operating mode of IE 7 in Windows Vista. The User Account Control (UAC) of Vista is used to differentiate IE from other software. Without user permission, it will prevent its plug-in from writing content to any place except the Temporary Internet Files folder.

Internet Information Services (IIS) 7.0

Internet Information Service (IIS) 7.0. A Web server built in Windows Vista can use a module structure to overwrite the configuration of the Web server into an XML file, instead of using metabase.

IPSec

Internet Protocol Security (Internet Protocol Security) is a standard mechanism used to provide authentication, integrity, and confidentiality for packets that pass through an IP network.

IPv6

The next version of the IP protocol is a network layer component of the TCP/IP protocol package. It expands the address space by using a 128-bit address (in contrast, IPv4 uses a 32-bit address) and provides a better security mechanism.

Kerberos

An authentication standard that uses a central server to provide "tickets" for identification by other servers that provide resources on the network. It is supported in Windows 2000, XP, Server 2003, Vista, Longhorn, and UNIX systems.

Legacy applications

Legacy programs. The UAC specification program was not used before Vista.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.