Content

Glossary

      • AES (Advanced Encryption Standard)

        The Advanced Encryption Standard is a method for encrypting information in order to transfer it safely. Because of the large key length it offers a high rate of security for the data transfer.

        Batch file

        A Batch file is a Microsoft file which automates computer processes and executes them sequentially.

        Boxcryptor

        Boxcryptor is a special software for encrypting information.

        Client

        The Client is a computer program that is run on terminal devices of a network and is connected to a server. It is able to use some services of the server and serves as an interface for communication between the program and the server.

        Cloud

        A Cloud is a pool of configurable computing resources in which you can save local files and run programs that are not installed on your local servers.

        Coda filesystem

        Coda is a distributed file system that is based in one network and allows many computers to work with it simultaneously. The collected data is saved on a number of servers which adjust and assimilate the date between each other. You can then access the data with local and mobile computers.

        Command line parameters

        Command line parameters are transfer codes that transmit settings to computer programs. The commands used by the program are set in a command line.

        CPU usage

        The CPU usage shows the percentage of the calculating time of a computer. It describes the current state of the processors of a computer. If the computer needs a lot of calculating time for the coping of ongoing processes the CPU usage is very high. So the CPU usage is low if the calculating time is low.

        Drag & Drop Upload

        You can upload your file by dragging it in the meant field of the FAUbox.

        Drive letter

        The different drives of a computer (e.g. the CD/DVD-Drive) are represented by a letter. This letter is the drive letter.

        E2EE (End-to-End-Encryption)

        The End-to-End-Encryption is a method for encoding information in a data transfer. The software of the sender encrypts the information while the software of the receiver decrypts it.

        Faubox-Admins

        FAUbox-Admins are Employees of the regional computer center (RRZE) who have the authorization as administrator.

        FAUbox base folder

        The folder which the FAUbox Client automatically feels responsible for.
        Under Windows:C:\Users\<User>\FAUbox
        Under Linux/Mac OS :/home/<User>/FAUbox

        Folder rights

        The folder rights are describing which rights every single member has to the folder. The owner or admin for example is able to delete top level folders, send invitations, remove members and send links to other users. Meanwhile folder-members without quota cannot do anything except for reading and downloading documents they have access to.

        Fuse filesystem

        FUSE is the short term for ‘filesystem in userspace’. It describes a kernel module that enables unprivileged users to create their own filesystems.

        HTTP protocol

        HTTP is the short term for ‘hypertext transfer protocol’. It’s a protocol  that divides different requests into independent transactions and is used for the data transmission to the application layer of a computer network. It is often used for the transmission of websites from the World Wide Web into a web browser.

        KDE

        KDE is a graphical user interface of Linux.

        Multi source download

        It describes the process of downloading files from different sources. Because of this the time required for the download will be reduced.

        NAT traversal connection

        NAT means ‘network address translation’. These are methods to connect different networks by changing the address information of the data packets.

        Online Backup

        This term describes a strategy for the data backup via the internet.

        On-Premise-Synchronization

        On-Premise is a model describing the usage of computer programs and is run by the user on his own hardware.

        Orga-Admins

        Orga-Admins are employees of a connected institution who have the authorization as administrators (usually an employee of the local RRZE)

        Peer-to-peer

        A peer-to-peer connection is a computer connection in which all participating computers are equal. Therefore every computer can provide services and has access to all services provided.

        Proxy detection

        Proxy detection decribes the process of the system identifying an internet computer network server which enables the client to send orders.

        SHA (Secure Hash Algorithm)

        SHA is a cryptologic hash-function that is used for data processing and the checking of the integrity of an information. The algorithm leads to a precised test value of digital data. This test value serves as a digital signature and guarantees the integrity of the data.

        SSL (Secure Socket Layer)

        SSL means Secure Socket Layer and is an encryption protocol for a secure data transfer.

        Subfolder

        A subfolder is a folder in a level below the top level folder. All subfolders and the files saved in them have the same rights as the top level folder.

        System Service

        The Windows-System-Servivce is a program working in the background of Windows and providing the functionality of the operating system.

        Relay

        A relay is an electromechanic button. It is activated through electric circuits and often used to change them.

        RSA

        The RSA (Rivest Shamir Adleman) algorithm is the most common system for authentication and encryption in the internet.

        TCP

        TCP means ‘transmission control protocol’. It is a protocol that is used for the data transfer over the internet.

        Terminal server

        The terminal server is a software that is installed on a central computer. This software provides different applications for a lot of clients.

        Token

        A Security-Token is a chain of encrypted information including the username, the Token-expire time and proprietary information. The Token is used for the authentication of users.

        Toplevel Folder

        A Top Level Folder is a folder in the FAUbox that is placed directly under the FAUbox base folder. The rights for all files and all subfolders are saved in the top level folder.

        UNC (Universal Naming Convention)

        The Universal Naming Convention is a network path one can use to get access to the network of a computer without having to use a drive letter. It makes the direct connection to a network drive unnecessary.

        WAN

        WAN is a short form for ‘wide area network’. It is a computer network that has no limit regarding connecting computers and is spread over a huge geographic area.

        ZIP compression

        On a Windows system it is possible to compress files and folders to ZIP folders. These ZIP folders have a space-saving file format and can be transferred very fast. Because of the compression the bytes that are included in the file are reduced while the content stays the same. To change the file to the original state the ZIP file has to be extracted.