Export (0) Print
Expand All

C

Internet Security and Acceleration Server 2004/2006 SDK

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

cache
A store of frequently retrieved objects and URLs located on the cache drive of an ISA Server computer. Instead of retrieving an object directly from an Internet Web server, the object is stored and retrieved from the cache instead. Caches improve network performance by reducing the number of objects retrieved from the Internet based on their popularity.
cache drive
A hard disk partition where cached content is stored on an ISA Server computer that is configured for caching. Each cache drive is identified by its drive letter (C:, D:, etc.), and each cache drive has a specified amount of space, in megabytes, that can be allocated for caching.
certificate
See digital certificate.
CGI
See Common Gateway Interface (CGI).
chaining
A method to link multiple ISA Server computers together for routing requests among them. Communication is in an upstream, hierarchical order.
challenge/response
See Microsoft Challenge Handshake Authentication Protocol (MS-CHAP).
clear text
See Basic authentication.
COM object
A programming structure that includes both data and functionality. A COM object is defined and allocated as a single unit. The only public access to a COM object is through the programming structure's interfaces. At a minimum, a COM object must support the IUnknown interface, which maintains the object's existence while it is being used and provides access to the object's other interfaces.
Common Gateway Interface (CGI)
A standard interface for HTTP server applications. It is used by an application that runs on a server to generate dynamic content based on parameters sent by the requesting Web browser.
completion port
See I/O completion port.
connection object
In application filters, a COM object that implements the IFWXConnection interface and represents a single connection within the Microsoft Firewall service.
credentials
Information that is supplied by a user or system entity to state and prove its identify. Credentials are used in authentication methods for verifying the identity of users and system entities, such as client computers and servers.
Show:
© 2014 Microsoft