Acronym |
Stands for |
3DES | Triple Data Encryption Standard |
AAA | Authentication, Authorization and Accounting |
ACL | Access Control List |
AES | Advanced Encryption Standard |
AES 256 | Advanced Encryption Standards, 256-bit |
AH | Authentication Header |
ARP | Address Resolution Protocol |
AUP | Acceptable Use Policy |
BCP | Business Continuity Planning |
BIOS | Basic Input/Output System |
BOTS | Network Robots |
CA | Certificate Authority |
CCTV | Closed-Circuit Television |
CERT | Computer Emergency Response Team |
CHAP | Challenge Handshake Authentication Protocol |
CIRT | Computer Incident Response Team |
CRL | Certification Revocation List |
DAC | Discretionary Access Control |
DDOS | Distributed Denial of Service |
DEP | Data Execution Prevention |
DES | Data Encryption Standard |
DHCP | Dynamic Host Configuration Protocol |
DLL | Dynamic Link Library |
DLP | Data Loss Prevention |
DMZ | Demilitarized Zone |
DNS | Domain Name Service |
DOS | Denial Of Service |
DRP | Disaster Recovery Plan |
DSA | Digital Signature Algorithm |
EAP | Extensible Authentication Protocol |
ECC | Elliptic Curve Cryptography |
EFS | Encrypted File System |
EMI | Electromagnetic Interference |
ESP | Encapsulated Security Payload |
FTP | File Transfer Protocol |
GPU | Graphic Processing Unit |
GRE | Generic Routing Encapsulation |
HDD | Hard Disk Drive |
HIDS | Host-Based Intrusion Detection System |
HIPS | Host-Based Intrusion Prevention System |
HMAC | Hashed Message Authentication Code |
HSM | Hardware Security Module |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol over SSL |
HVAC | Heating, Ventilation, Air Conditioning |
IaaS | Infrastructure as a Service |
ICMP | Internet Control Message Protocol |
ID | Identification |
IKE | Internet Key Exchange |
IM | Internet Messaging |
IMAP4 | Internet Message Access Protocol v4 |
IP | Internet Protocol |
IPSEC | Internet Protocol Security |
IRC | Internet Relay Chat |
ISP | Internet Service Provider |
KDC | Key Distribution Center |
L2TP | Layer 2 Tunneling Protocol |
LANMAN | Local Area Network Manager |
LDAP | Lightweight Directory Access Protocol |
LEAP | Lightweight Extensible Authentication Protocol |
MAC | Mandatory Access Control / Media Access Control |
MAC | Message Authentication Code |
MBR | Master Boot Record |
MDS | Message Digest 5 |
MSCHAP | Microsoft Challenge Handshake Authentication Protocol |
MTU | Maximum Transmission Unit |
NAC | Network Access Control |
NAT | Network Address Translation |
NIDS | Network-Based Intrusion Detection System |
NIPS | Network-Based Intrusion Prevention System |
NOS | Network Operating System |
NTFS | New Technology File System |
NTLM | New Technology LANMAN |
NTP | Network Time Protocol |
OS | Operating System |
OVAL | Open Vulnerability Assessment Language |
PAP | Password Authentication Protocol |
PAT | Port Address Translation |
PEAP | Protected Extensible Authentication Protocol |
PGP | Pretty Good Privacy |
PKI | Public Key Infrastructure |
PPP | Point-to-Point Protocol |
PPTP | Point-to-Point Tunneling Protocol |
PSK | Pre-Shared Key |
RA | Recovery Agent |
RADIUS | Remote Authentication Dial-in User Server |
RAID | Redundant Array of Inexpensive Disks |
RAS | Remote Access Server |
RBAC | Role Based Access Control |
RSA | Rivest, Shamir & Adleman |
RTP | Real-Time Transport Protocol |
S/MIME | Secure/Multipurpose Internet Mail Extension |
SaaS | Software as a Service |
SCAP | Security Content Automation Protocol |
SCSi | Small Computer System Interface |
SDLC | Software Development Life Cycle |
SDLM | Software Development Life Cycle Methodology |
SHA | Secure Hashing Algorithm |
SHTTP | Secure Hypertext Transfer Protocol |
SIM | Subscriber Identity Module |
SLA | Service Level Agreement |
SLE | Single Loss Expectancy |
SMS | Short Message Service |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SSH | Secure Shell |
SSL | Secure Sockets Layer |
SSO | Single Sign-On |
TACACS | Terminal Access Controller Access Control System |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TLS | Transport Layer Security |
TPM | Trusted Platform Module |
UAT | User Acceptance Testing |
UPS | Uninterrupted Power Supply |
URL | Universal Resource Locator |
USB | Universal Serial Bus |
UTP | Unshielded Twisted Pair |
VLAN | Virtual Local Area Network |
VoIP | Voice Over IP |
VPN | Virtual Private Network |
VTC | Video Teleconferencing |
WAF | Web Application Firewall |
WAP | Wireless Access Point |
WEP | Wired Equivalent Privacy |
WIDS | Wireless Intrusion detection System |
WIPS | Wireless Intrusion Prevention System |
WPA | Wireless Protected Access |
XSRF | Cross-Site request Forgery |
XSS | Cross-Site Scripting |
Tag: BIOS
A handy, portable system information tools
A handy, portable system information tools:
Speccy:
Speccy is an advanced System Information tool for your PC. Need to find out what’s inside your computer? Speccy will give you all the information you need.
Speccy gives you detailed statistics on every piece of hardware in your computer, including CPU, Motherboard, RAM, Graphics Cards, Hard Disks, Optical Drives, and Audio support. Additionally Speccy adds the temperatures of your different components, so you can easily see if there’s a problem!
Speccy may seem like an application for system administrators and power users. It certainly is, but Speccy can also help normal users, in everyday computing life.
If you need to add more memory to your system, for example, you can check how many memory slots your computer has and what memory’s already installed. Then you can go out and buy the right type of memory to add on or replace what you’ve already got.
Note: Speccy requires Windows XP or later, and does not currently support Mac OS X or Linux.
To download the Speccy click on the URL: http://www.piriform.com/speccy/download/standard
CPU-Z:
CPU-Z is a freeware utility that gathers information on some of the main devices of your system. CPU-Z does not need to be installed, just unzip the files in a directory and run the .exe. In order to remove the program, just delete the files. The program does not copy any file in any Windows directory, nor write to the registry.
CPU
- Name and number.
- Core stepping and process.
- Package.
- Core voltage.
- Internal and external clocks, clock multiplier.
- Supported instructions sets.
- All cache levels (location, size, speed, technology)
Mainboard
- Vendor, model and revision.
- BIOS model and date.
- Chipset (northbridge and southbridge) and sensor.
- Graphic interface.
Memory
- Frequency and timings.
- Module(s) specification using SPD (Serial Presence Detect): vendor, serial number, timings table.
System
- Windows and Direct X version.
To download the CPU-Z click on the URL: http://www.cpuid.com/softwares/cpu-z.html
UEFI:
UEFI: The acronym stands for Unified Extensible Firmware Interface and is designed to be more flexible than its venerable predecessor.
Wave goodbye to BIOS, say hello to UEFI, a new technology that will drastically reduce start-up times.
The next generation of home computers will be able to boot up in just a few seconds, as 25-year-old BIOS technology makes way for new start-up software known as UEFI.
BIOS technology, which has been used to boot up computers since 1979, was never designed to last as long as it has, and is one of the reasons modern computers take so long to get up and running.
By contrast, UEFI – which stands for Unified Extensible Firmware Interface – has been built to meet modern computing needs, and will soon be the pre-eminent technology in many new computers, enabling them to go from ‘off’ to ‘on’ in seconds.
Pronounced “bye-ose,” BIOS is an acronym for basic input/output system. The BIOS is built-in software that determines what a computer can do without accessing programs from a disk. On PCs, the BIOS contains all the code required to control the keyboard, display screen, disk drives, serial communications, and a number of miscellaneous functions.
The BIOS is typically placed on a ROM chip that comes with the computer (it is often called a ROM BIOS). This ensures that the BIOS will always be available and will not be damaged by disk failures. It also makes it possible for a computer to boot itself.
Below are the major BIOS manufacturers:
When you turn on your computer, several events occur automatically:
- The CPU “wakes up” (has power) and reads the x86 code in the BIOS chip.
- The code in the BIOS chip runs a series of tests, called the POST for Power On Self-Test, to make sure the system devices are working correctly. In general, the BIOS:
- Initializes system hardware and chipset registers
- Initializes power management
- Tests RAM (Random Access Memory)
- Enables the keyboard
- Tests serial and parallel ports
- Initializes floppy disk drives and hard disk drive controllers
- Displays system summary information
- During POST, the BIOS compares the system configuration data obtained from POST with the system information stored on a CMOS – Complementary Metal-Oxide Semiconductor – memory chip located on the motherboard. (This CMOS chip, which is updated whenever new system components are added, contains the latest information about system components.)
The BIOS has two fundamental weaknesses. Firstly, it is based on 16-bit assembly code and cannot directly address the latest 64-bit hardware, and secondly, there are no set standards for specifications, so manufacturers come up with their own versions.
The participants of the UEFI Forum wanted to set this straight. From the outset, each process has been precisely defined. Thus, the boot process or platform initialization (PI) is clearly described in phases. Immediately after powering up the PC, the Pre-EFI Initialization (PEI) is executed, which initializes the CPU, memory and chipset. This is then followed by the Driver Execution Environment (DXE). At this point, the rest of the hardware is initialized. This process saves the time required for booting because UEFI can integrate various drivers that need not be reloaded during booting. Thanks to these drivers, the user already has access to network card, including features such as network booting and remote assistance at the early stage of the boot process. With the graphics processor enabled, a fancy user interface is also presented.
However, biggest time-saving feature of UEFI is the fact that not all the installed hard drives will be scanned for the boot loader, since the boot drive is set during the installation of the operating system in the UEFI. The default boot loader is run without consuming much time searching the drives.
The faster boot time is not the only advantage of UEFI; applications can be stored on virtually any non-volatile storage device installed on the PC. For example, programs and diagnostic tools such as antivirus or system management tools can be run from an EFI partition on the hard drive. This feature will be very useful to original equipment manufacturers (OEM), who can distribute systems with extra functions in addition to the standard EFI firmware stored on the motherboard’s ROM.
UEFI fully supports 3 TB hard drives
The classic BIOS can access only up to 232 sectors of 512 bytes in size, which translates to a total of 2 TB. So the upcoming 3 TB variants of Western Digital Caviar Green and Seagate Barracuda XT won’t be fully compatible with the current BIOS. Seagate uses larger sectors to make the full capacity usable on Windows, but the BIOS cannot boot from this drive.
UEFI, on the other hand, works with GUID partition table (GPT) with 64-bit long addresses and can handle up to 264 sectors that address up to 9 Zettabyte (1 zettabyte equals 1 billion terabytes).
The GUID Partition Table (GPT) was introduced as part of the Unified Extensible Firmware Interface (UEFI) initiative. GPT provides a more flexible mechanism for partitioning disks than the older Master Boot Record (MBR) partitioning scheme that was common to PCs.
A partition is a contiguous space of storage on a physical or logical disk that functions as if it were a physically separate disk. Partitions are visible to the system firmware and the installed operating systems. Access to a partition is controlled by the system firmware before the system boots the operating system, and then by the operating system after it is started.
MBR disks support only four partition table entries. If more partitions are wanted, a secondary structure known as an extended partition is necessary. Extended partitions can then be subdivided into one or more logical disks.
GPT disks can grow to a very large size. The number of partitions on a GPT disk is not constrained by temporary schemes such as container partitions as defined by the MBR Extended Boot Record (EBR).
The GPT disk partition format is well defined and fully self-identifying. Data critical to platform operation is located in partitions and not in unpartitioned or “hidden” sectors. GPT disks use primary and backup partition tables for redundancy and CRC32 fields for improved partition data structure integrity. The GPT partition format uses version number and size fields for future expansion. Each GPT partition has a unique identification GUID and a partition content type, so no coordination is necessary to prevent partition identifier collision. Each GPT partition has a 36-character Unicode name. This means that any software can present a human-readable name for the partition without any additional understanding of the partition.
Below given Windows OS supports GPT:
- Windows 7
- Windows Server 2008
- Windows Server 2008 R2
- Windows Vista
- Windows Server 2003 SP1
- Windows Server 2003 (64-bit)
- Windows XP x64 edition