background authentication
- background authentication
The process used to give a workstation access to a particular server. For example, in Novell NetWare, password authentication uses a public key encryption scheme to protect password information before it is transmitted over the network. All this activity takes place in the background, and all the user has to do is enter his or her password.
Dictionary of networking .
2014.
Look at other dictionaries:
Background Intelligent Transfer Service — (BITS) is a component of modern Microsoft Windows operating systems that facilitates prioritized, throttled, and asynchronous transfer of files between machines using idle network bandwidth. It is most commonly used by recent versions of Windows… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Windows Vista networking technologies — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features … Wikipedia
Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… … Wikipedia
X Window System core protocol — The X Window System logo The X Window System core protocol[1][2][3] is the base protocol of the X Windo … Wikipedia
Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… … Wikipedia
Internet security — is a branch of computer security[1] specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[2] The Internet represents an insecure channel for exchanging information leading … Wikipedia
Killian documents controversy — Further information: Killian documents authenticity issues and George W. Bush military service controversy Charles Johnson s animated GIF image comparing what CBS claimed to be a 1973 era typewritten memo with a 2004 era Microsoft Word… … Wikipedia