Microsoft Office 2003 Editions Resource Kit [Electronic resources] نسخه متنی

This is a Digital Library

With over 100,000 free electronic resource in Persian, Arabic and English

Microsoft Office 2003 Editions Resource Kit [Electronic resources] - نسخه متنی

Microsoft Corporation

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید







D-E


decrypt


The process of converting cipher (scrambled) text back into plain, readable text. Recipients decrypt (unlock) the e-mail messages, macros, or programs sent to them by using the private key that matches the public key used for encryption.




digital ID


Contains a private key that stays on the originator’s computer and a certificate (with a public key). The certificate is sent with digitally signed messages or included with macros or programs. Recipients save the certificate and use the public key to encrypt messages to the sender.




digital signature


Confirms that an e-mail message, macro, or program originated from a trusted source who signed it. Also confirms that the message, macro, or program has not been altered. Includes the signer’s certificate (with the public key).




Document libraries


A folder where a collection of files is stored amid the files often using the same template. Each file in a library is associated with user-defined information that is displayed in the content listing for that library.




elevated privileges


In Windows 2000 or later, a method of granting administrator rights to an installation program to modify system areas of the Windows registry or password-secured folders of a hard disk. Can be accomplished by logging on with administrator rights, advertising the program, giving administrator rights to all Windows Installer programs, or using Microsoft Systems Management Server. See also advertise.




encryption


The process of encoding data to prevent unauthorized access. An encrypted message is unreadable to all but the recipient, who has a public key that will decrypt it because the key matches the private key that the sender used to encrypt it.




encryption, 128-bit


High level of encryption. Uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key.




encryption, 40-bit


Low level of encryption. Uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key.




/ 196