Share via


C

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

  • cache
    A store of frequently retrieved objects and URLs located on the cache drive of a Forefront TMG computer. Instead of retrieving an object directly from an Internet Web server, the object is stored and retrieved from the cache instead. Caches improve network performance by reducing the number of objects retrieved from the Internet based on their popularity.

  • cache drive
    A hard disk partition where cached content is stored on a Forefront TMG computer that is configured for caching. Each cache drive is identified by its drive letter (C:, D:, etc.), and each cache drive has a specified amount of space, in megabytes, that can be allocated for caching.

  • certificate
    See digital certificate.

  • CGI
    See Common Gateway Interface (CGI).

  • chaining
    A method to link multiple Forefront TMG computers together for routing requests among them. Communication is in an upstream, hierarchical order.

  • challenge/response
    See Microsoft Challenge Handshake Authentication Protocol (MS-CHAP).

  • clear text
    See Basic authentication.

  • COM object
    A programming structure that includes both data and functionality. A COM object is defined and allocated as a single unit. The only public access to a COM object is through the programming structure's interfaces. At a minimum, a COM object must support the IUnknown interface, which maintains the object's existence while it is being used and provides access to the object's other interfaces.

  • Common Gateway Interface (CGI)
    A standard interface for HTTP server applications. It is used by an application that runs on a server to generate dynamic content based on parameters sent by the requesting Web browser.

  • completion port
    See I/O completion port.

  • connection object
    In application filters, a COM object that implements the IFWXConnection interface and represents a single connection within the Microsoft Firewall service.

  • credentials
    Information that is supplied by a user or system entity to state and prove its identify. Credentials are used in authentication methods for verifying the identity of users and system entities, such as client computers and servers.

  • cryptographic service provider
    A software module that implements cryptography algorithms for authentication, encoding, and encryption.

 

 

Build date: 7/12/2010