- AES (Advanced Encryption Standard)
- Batch file
- Coda filesystem
- Command line parameters
- CPU usage
- Drag & Drop Upload
- Drive letter
- E2EE (End-to-End-Encryption)
- FAUbox base folder
- FAUbox-user identification
- Folder rights
- Fuse filesystem
- HTTP protocol
- Multi Source Download
- NAT traversal connection
- Online Backup
- Proxy Detection
- SHA (Secure Hash Algorithm)
- SSL (Secure Socket Layer)
- System Service
- Terminal Server
- Top-level folder
- UNC (Universal Naming Convention)
- ZIP Compression
AES (Advanced Encryption Standard)
Coda is a distributed file system that is based on one network and allows many computers to work with it simultaneously. The collected data is saved on a number of servers that adjust and assimilate the data between each other. The data can then be accessed from local computers and mobile devices.
Command line parameters
CPU usage shows the percentage of the calculating time of a computer. It describes the current state of the processors of a computer. If the computer needs a lot of calculating time for managing ongoing processes the CPU usage is very high. Therefore, the CPU usage is low if the calculating time is low.
Drag & Drop Upload
- A file can be uploaded by dragging it to the desired location in the FAUbox.
FAUbox base folder
The folder rights are the particular rights that each member respectively has in regards to the folder. The owner or admin for instance is able to delete top-level folders, send invitations, remove members, and send links to other users. Meanwhile, folder members without quota are merely able to read and download documents that they were given access to.
HTTP is the short term for ‘hypertext transfer protocol’. It’s a protocol that divides different requests into independent transactions and is used for data transmission to the application layer of a computer network. It is often used for the transmission of websites from the World Wide Web into a web browser.
It describes the process of concurrently downloading file parts from multiple sources for a single file. By using this download method the client is able to reduce the time required to download the file.
NAT traversal connection
A path is a string of characters that denotes a file, a directory, or other resources on a computer system, depending on the platform. The path length is then composed of the actual filename and the path of the directories.
The path will look like this:
Windows : d:\Program Files\ImageMagik\Photo\DSC.jpg
Mac/Linux : /home/nutzername/medien/photo/Ausspieler/REDT/DSC.jpg
SHA (Secure Hash Algorithm)
SHA is a cryptologic hash-function that is used for data processing and the checking of the integrity of information. The algorithm leads to a precise test value of digital data. This test value serves as a digital signature and guarantees the integrity of the data.
SSL (Secure Socket Layer)
UNC (Universal Naming Convention)
The Universal Naming Convention is a network path one can use to get access to the network of a computer without having to use a drive letter. It makes the direct connection to a network drive unnecessary.
On a Windows system, it is possible to compress files and folders to ZIP folders. These ZIP folders have a space-saving file format and can be transferred very fast. Because of the compression, the bytes that are included in the file are reduced while the content remains the same. To change the file to the original state, the ZIP file has to be extracted.