ACL
Access Control List. A mechanism for defining which users have access to your server. You can define ACL rules that are specific to a particular file or directory, granting or denying access to one or more users and groups.
agent
Software that runs the network-management software in a network device, such as a router, host, or X terminal. See also intelligent agents.
authentication
Allows client to verify that they are connected to an SSL-enabled server, preventing another computer from impersonating the server or attempting to appear SSL-enabled when it isn't.
authorization
The granting of access to an entire server or particular files and directories on it. Authorization can be restricted by criteria including hostnames and IP addresses.
browser
See client.
cache
A copy of original data that is stored locally. Cached data doesn't have to be retrieved from a remote server again when requested.
certification authority
A third-party organization that issues digital files used for encrypted transactions.
certificate
A nontransferable, nonforgeable, digital file issued from a third party that both communicating parties already trust.
CGI
Common Gateway Interface. An interface by which external programs communicate with the HTTP server. Programs that are written to use CGI are called CGI programs or CGI scripts. CGI programs handle forms or parse output the server does not normally handle or parse.
ciphertext
Information disguised by encryption, which only the intended recipient can decrypt.
client
Software, such as Netscape Navigator, used to request and view World Wide Web material. Also known as a browser program.
collection
A database that contains information about documents, such as word list and file properties. Collections are used by the search function to retrieve documents matching specified search criteria.
Common LogFile Format
The format used by the server for entering information into the access logs. The format is the same among all major servers, including the Netscape FastTrack and Enterprise servers.
DHCP
Dynamic Host Configuration Protocol. An Internet Proposed Standard Protocol that allows a system to dynamically assign an IP address to individual computers on a network.
daemon
A background process responsible for a particular system task.
DNS
Domain Name System. The system that machines on a network use to associate standard IP addresses (such as 198.93.93.10) with hostnames (such as www.netscape.com). Machines normally get this translated information from a DNS server, or they look it up in tables maintained on their systems.
DNS alias
A hostname that the DNS server knows points to a different host--specifically a DNS CNAME record. Machines always have one real name, but they can have one or more aliases. For example, an alias such as www.yourdomain.domain might point to a real machine called realthing.yourdomain.domain where the server currently exists.
document root
A directory on the server machine that contains the files, images, and data you want to present to users accessing the server.
drop word
See stop word.
encryption
The process of transforming information so it can't be decrypted or read by anyone but the intended recipient.
expires header
The expiration time of the returned document, specified by the remote server.
extranet
An extension of a company's intranet onto the Internet, to allow customers, suppliers, and remote workers access to the data.
fancy indexing
A method of indexing that provides more information than simple indexing. Fancy indexing displays a list of contents by name with file size, last modification date, and an icon reflecting file type. Because of this, fancy indexes might take longer than simple indexes for the client to load.
file extension
The last part of a filename that typically defines the type of file. For example, in the filename index.html the file extension is html.
file type
The format of a given file. For example, a graphics file doesn't have the same file type as a text file. File types are usually identified by the file extension (.gif or .html).
firewall
A network configuration, usually both hardware and software, that protects networked computers within an organization from outside access. Firewalls are commonly used to protect information such as a network's email and data files within a physical building or organization site.
flexible log format
A format used by the server for entering information into the access logs.
FTP
File Transfer Protocol. An Internet protocol that allows files to be transferred from one computer to another over a network.
GIF
Graphics Interchange Format. A cross-platform image format originally created by CompuServe. GIF files are usually much smaller in size than other graphic file types (BMP, TIFF). GIF is one of the most common interchange formats. GIF images are readily viewable on Unix, Microsoft Windows, and Apple Macintosh systems.
hard restart
The termination of a process and its subsequent restart. See also soft restart.
home page
A document that exists on the server and acts as a catalog or entry point for the server's contents. The location of this document is defined within the server's configuration files.
hostname
A name for a machine in the form machine.domain.dom, which is translated into an IP address. For example, www.netscape.com is the machine www in the subdomain netscape and com domain.
HTML
Hypertext Markup Language. A formatting language used for documents on the World Wide Web. HTML files are plain text files with formatting codes that tell browsers such as the Netscape Navigator how to display text, position graphics and form items, and display links to other pages.
HTTP
HyperText Transfer Protocol. The method for exchanging information between HTTP servers and clients.
HTTP-NG
The next generation of HyperText Transfer Protocol.
HTTPD
An abbreviation for the HTTP daemon, a program that serves information using the HTTP protocol. The Netscape Enterprise Server is often called an HTTPD.
HTTPS
A secure version of HTTP, implemented using the Secure Sockets Layer, SSL.
imagemap
A process that makes areas of an image active, letting users navigate and obtain information by clicking the different regions of the image with a mouse. Imagemap can also refer to a CGI program called "imagemap," which is used to handle imagemap functionality in other HTTPD implementations.
inittab
A Unix file listing programs that need to be restarted if they stop for any reason It ensures that a program runs continuously. Because of its location, it is also called /etc/inittab. This file isn't available on all Unix systems.
intelligent agent
An object within a server that performs various requests (such as HTTP, NNTP, SMTP, and FTP requests) on behalf of the user. In a sense, the intelligent agent acts as a client to the server, making requests that the server fulfills.
IP address
Internet Protocol address. A set of numbers, separated by dots, that specifies the actual location of a machine on the Internet (for example, 198.93.93.10).
ISDN
Integrated Services Digital Network.
ISINDEX
An HTML tag that turns on searching in the client. Documents can use a network navigator's capabilities to accept a search string and send it to the server to access a searchable index without using forms. In order to use <ISINDEX>, you must create a query handler.
ISMAP
ISMAP is an extension to the IMG SRC tag used in an HTML document to tell the server that the named image is an imagemap.
ISP
Internet Service Provider. An organization that provides Internet connectivity.
Java
An object-oriented programming language created by Sun Microsystems used to create real-time, interactive programs called applets.
JavaScript
A compact, object-based scripting language for developing client and server Internet applications.
last-modified header
The last modification time of the document file, returned in the HTTP response from the server.
MD5
A message digest algorithm by RSA Data Security. MD5 can be used to produce a short digest of data that is unique with high probability. It is mathematically extremely hard to produce a piece of data that produces the same message digest email.
MD5 signature
A message digest produced by the MD5 algorithm.
MIB
Management Information Base.
MIME
Multi-Purpose Internet Mail Extensions. An emerging standard for multimedia email and messaging.
MTA
Message Transfer Agent. You must define your server's MTA Host to use agent services on your server.
NIS
Network Information Service. A system of programs and data files that Unix machines use to collect, collate, and share specific information about machines, users, file systems, and network parameters throughout a network of computers.
NNTP
Network News Transfer Protocol for newsgroups. You must define your news server host to use agent services on your server.
NSAPI
See Server Plug-in API.
password file
A file on Unix machines that stores Unix user login names, passwords, and user ID numbers. It is also known as /etc/passwd, because of where it is kept.
primary document directory
See document root.
protocol
A set of rules that describes how devices on a network exchange information.
private key
The decryption key used in public-key encryption.
public key
The encryption key used in public-key encryption.
public information directories
Directories not inside the document root that are in a Unix user's home directory, or directories that are under the user's control.
RAM
Random access memory. The physical semiconductor-based memory in a computer.
rc.2.d
A file on Unix machines that describes programs that are run when the machine starts. This file is also called /etc/rc.2.d because of its location.
redirection
A system by which clients accessing a particular URL are sent to a different location, either on the same server or on a different server. This system is useful if a resource has moved and you want the clients to use the new location transparently. It's also used to maintain the integrity of relative links when directories are accessed without a trailing slash.
resource
Any document (URL), directory, or program that the server can access and send to a client that requests it.
RFC
Request For Comments. Usually, procedures or standards documents submitted to the Internet community. People can send comments on the technologies before they become accepted standards.
root
The most privileged user on Unix machines. The root user has complete access privileges to all files on the machine.
server daemon
A process that, once running, listens for and accepts requests from clients.
Server Plug-in API
An extension that allows you to extend and/or customize the core functionality of Netscape servers and provide a scalable, efficient mechanism for building interfaces between the HTTP server and back-end applications. Also known as NSAPI.
server root
A directory on the server machine dedicated to holding the server program, configuration, maintenance, and information files.
simple index
The opposite of fancy indexing--this type of directory listing displays only the names of the files without any graphical elements.
SNMP
Simple Network Management Protocol.
SOCKS
Firewall software that establishes a connection from inside a firewall to the outside when direct connection would otherwise be prevented by the firewall software or hardware (for example, the router configuration).
soft restart
A way to restart the server that causes the server to internally restart, that is, reread its configuration files. A soft restart sends the process the HUP signal (signal number one). The process itself does not die, as it does in a hard restart.
SSL
Secure Sockets Layer. A software library establishing a secure connection between two parties (client and server) used to implement HTTPS, the secure version of HTTP.
stop word
A word identified to the search function as a word not to search on. This typically includes such words as the, a, an, and. Also referred to as drop words.
strftime
A function that converts a date and a time to a string. It's used by the server when appending trailers. strftime has a special format language for the date and time that the server can use in a trailer to illustrate a file's last-modified date.
superuser
The most privileged user available on Unix machines (also called root). The superuser has complete access privileges to all files on the machine.
Sym-links
Abbreviation for symbolic links, which is a type of redirection used by the Unix operating system. Sym-links let you create a pointer from one part of your file system to an existing file or directory on another part of the file system.
TCP/IP
Transmission Control Protocol/Internet Protocol. The main network protocol for the Internet and for enterprise (company) networks.
telnet
A protocol where two machines on the network are connected to each other and support terminal emulation for remote login.
timeout
A specified time after which the server should give up trying to finish a service routine that appears hung.
top
A program on some Unix systems that shows the current state of system resource usage.
top-level domain authority
The highest category of hostname classification, usually signifying either the type of organization the domain is (for example, .com is a company, .edu is an educational institution) or the country of its origin (for example, .us is the United States, .jp is Japan, .au is Australia, .fi is Finland).
uid
A unique number associated with each user on a Unix system.
URI
Uniform Resource Identifier. A file identifier that provides an additional layer of security by using an abbreviated URL. The first part of the URL is substituted with a URL mapping that hides the file's full physical pathname from the user. See also URL mapping.
URL
Uniform Resource Locator. The addressing system used by the server and the client to request documents. A URL is often called a location. The format of a URL is protocol://machine:port/document.
A sample URL is http://www.netscape.com/index.html.
URL database repair
A process that repairs and updates a URL database that has been damaged by a software failure, a system crash, a disk breakdown, or a full file system.
URL mapping
The process of mapping a document directory's physical pathname to a user-defined alias so that files within the directory need only refer to the directory's alias instead of the file's full physical pathname. Thus, instead of identifying a file as usr/Netscape/SuiteSpot/docs/index.html, you could identify the file as /myDocs/index.html. This provides additional security for a server by eliminating the need for users to know the physical location of server files.
web publishing
The capability of server clients to access and manipulate server files, editing and publishing documents remotely. Web publishing provides document version control, link management, search, access control, and agent services to server users.
Web Application Interface (WAI)
An easy-to-program mechanism for extending the Enterprise server's functionality with CORBA-compliant services that are tightly integrated with the web server. WAI can be used to compose services in C, C++, and Java that customize the functionality of the server.


Copyright 1997 Netscape Communications Corporation. All rights reserved.