Many of my friends have suggested that they do not know much about some of the technical terms of the system. We have summarized a number of commonly used words to explain them one by one.
Access control list (ACL)
The access control list stores the information about who and what target can be entered.
And who is authorized to perform the operation.
ActiveX
A technology developed by Microsoft is a combination of OLE and COM (OLE, object link and embedding; COM, Component Object Model), allowing Web developers to establish interactive web pages, and provides the same functions as Java applets.
Ad hoc wireless network
Ad hoc wireless networks. A 802.11 Wi-Fi network that operates on a computer rather than a wireless access point (WAP ).
Admin Approval Mode
Manage the Approval mode. Vista is set by default when the majority of programs are run with standard user permissions. Even if you log on with a system administrator account, you must upgrade the permissions to improve the permission level when necessary.
Aero
The new user interface of Windows Vista is not used for entry edition and Home Basic edition.
Aero Glass
The Aero interface is the most popular graphic interface. It provides 3D animation, transparency, and other visual effects, but requires a high level of system resources, as well as a graphics card compatible with directx 9.
Anti-spyware
Anti-Spyware. Use pre-defined files and heuristic logic to detect known or potential spyware on your computer and warn users to remove or isolate the spyware.
Aveon
See "Windows Presentation Foundation" (WPF ).
Bcdedit
A command line tool in Windows Vista is used to create and reconfigure bootloader, which does not need to use the boot. ini file.
BitLocker
A security feature provided in Windows Vista Enterprise Edition and advanced Edition allows you to encrypt the entire operating system volume using a TPM chip or a USB key disk.
Custom Scan
Custom scan. The protection program only scans the specified location.
Defender
Protection Program (you can view Windows Defender)
Desktop Search
Desktop Search. A built-in function in Windows Vista allows you to search for files based on the file name (or part of the file name), date, author, and many other attributes, you can directly go to the "Start Menu.
Desktop Windows Manager (DWM)
Desktop window manager. A Windows Vista window system that supports Aero (apart from entry edition and Home Basic edition) to process how to sketch the content on the screen.
Encrypting File System (EFS)
Encrypted File System (EFS ). A digital authentication-Based Encryption Method built into Windows 2000, XP, 2003, and Vista. It allows users to encrypt only a single file or folder, to protect the confidentiality of data.
Exceptions
. Data packets that are not blocked by Windows firewalls, programs, services, or ports are free of access.
File/registry virtualization
File/Registry virtualization. A new function allows a program to view only part of the resources it is trying to modify.
Firewall profiles
Firewall configuration file. Different firewall configurations are used in different cases. For example, a configuration file may be used to connect to the company network, while the other is used to connect to the home network, the third is used to connect to a wireless hotspot in a public place.
Flip/3D flip
The all-new window management function in Windows Vista allows you to use [Alt] [Tab] to flip between opened Windows. If you use 3D flip, you can use the Windows key plus the TAB key to flip on the stack of a 3D running window, using the scroll wheel or trackball on the mouse, it can also achieve the flip effect.
Full Scan
Full check. One Protection Program option to search for all files and folders on the entire computer (including files and folders on all hard disks ).
Heuristics
Heuristic logic. In the content of the protection program, there is a way to determine whether a program is more like a spyware Based on the program's behavior and key pattern before the program is finally confirmed by the relevant definition.
ICMP
ICMP is an Internet Control Message Protocol used for Error Reporting and debugging. ICMP responds to the request and the reply message used by the popular Ping command.
Internet Explorer 7
The seventh version of Internet Browser IE. Provides a new Web browser (now available for Windows XP) in Windows Vista to provide tagged browsing, new security mechanisms, and many other enhancements.
Internet Explorer Protected Mode
IE 7 protection mode. A new operating mode of IE 7 in Windows Vista. The User Account Control (UAC) of Vista is used to differentiate IE from other software. Without user permission, it will prevent its plug-in from writing content to any place except the Temporary Internet Files folder.
Internet Information Services (IIS) 7.0
Internet Information Service (IIS) 7.0. A Web server built in Windows Vista can use a module structure to overwrite the configuration of the Web server into an XML file, instead of using metabase.
IPSec
Internet Protocol Security (Internet Protocol Security) is a standard mechanism used to provide authentication, integrity, and confidentiality for packets that pass through an IP network.
IPv6
The next version of the IP protocol is a network layer component of the TCP/IP protocol package. It expands the address space by using a 128-bit address (in contrast, IPv4 uses a 32-bit address) and provides a better security mechanism.
Kerberos
An authentication standard that uses a central server to provide "tickets" for identification by other servers that provide resources on the network. It is supported in Windows 2000, XP, Server 2003, Vista, Longhorn, and UNIX systems.
Legacy applications
Legacy programs. The UAC specification program was not used before Vista.