
Glossary
| Access filtering | The preferred means of filtering IP packets at a system, router, gateway, or firewall on Tru64 | 
| 
 | UNIX operating systems. Access filtering is the means for implementing Ingress and Egress filtering. | 
| 
 | See also Ingress filtering and Egress filtering. | 
| Administrative | The set of systems or networks over which you have administrative control. | 
| domain | 
 | 
| Apache Web | A freely available  | 
| Server | Internet connected sites. HP's implementation of the Apache Web Server is called the Secure | 
| 
 | Web Server for Tru64 UNIX. | 
| Berkley Internet | See BIND. | 
| Name Domain | 
 | 
| Berkley Software | See BSD. | 
| Distribution | 
 | 
| BIND | Berkeley Internet Name Domain. An implementation of a Domain Name System (DNS) server | 
| 
 | developed and distributed for the University of California, Berkeley. Many Internet hosts run BIND. | 
| BSD | Berkeley Software Distribution. A UNIX software release of the Computer System Research Group | 
| 
 | of the University of California at  | 
| 
 | system. | 
| certificate authority | A third party organization that confirms the relationship between a party to the https transaction | 
| 
 | and that party's public key. Certification authorities may be widely known and trusted institutions | 
| 
 | for  | 
| 
 | department within the company may fulfill this role. | 
| CGI | Common Gateway Interface. A standard for running external programs on a World Wide Web | 
| 
 | HTTP server. External programs are called gateways, because they provide an interface between | 
| 
 | an external source of information and the server. | 
| Common Gateway | See CGI. | 
| Interface | 
 | 
| denial of service | See DoS. | 
| digital certificate | A token which underpins the principle of trust in  | 
| 
 | within a certificate includes the issuer (the Certificate Authority that issued the certificate), the | 
| 
 | organization that owns the certificate, the public key, the validity period (usually one year) of the | 
| 
 | certificate, and the host name that the certificate was issued in respect of. It is digitally signed by | 
| 
 | the Certificate Authority so that none of the details can be changed without invalidating the | 
| 
 | signature. See also certificate authority, digital signature. | 
| digital signature | A use of public key cryptography to authenticate a message. Digital signatures use a private key | 
| 
 | to indicate that the signature was made by the owner of that key. See also public key cryptography, | 
| 
 | private key. | 
| distinguished | Also called DN. A sequence of relative distinguished names (RDNs). See also relative distinguished | 
| name | name. | 
| Distributed DoS | An attack against a system that is characterized by the distributed nature of the attack, in which | 
| attack | false requests for service are generated from a set of DoS agents or servers installed on multiple | 
| 
 | systems and networks, all working together to saturate the service provider with requests. These | 
| 
 | attacks are much harder to stop than other DoS attacks because the source of the attack is more | 
| 
 | difficult to determine. Trinoo, Tribe Flood Network (TFN), and Stacheldraht are the most common | 
| 
 | kinds of Distributed DoS attacks. See also DoS attack. | 
| DN | See distinguished name. | 
| DNS | Domain Name System. A  | 
| 
 | on the Internet to translate host names into Internet addresses. See also fully qualified domain | 
| 
 | name,BIND, MX record. | 
| Domain Name | See DNS. | 
| System | 
 | 
