AES (Advanced Encryption Standard)

          The Advanced Encryption Standard is a method for encrypting information in order to transfer it safely. Because of the large key length it offers a high rate of security for the data transfer.

          Batch file

          A Batch file is a Microsoft file which automates computer processes and executes them sequentially.


          Boxcryptor is a software offering you to secure your cloud with an additional, user-friendly security layer by locally encrypting the files on your device.


          The Client is a computer program that runs on terminal devices of a network and is connected to the server. It is able to use some services of the server and serves as an interface for communication between the program and the server.


          A Cloud is a pool of configurable computing resources in which you can save local files and run programs that are not installed on your local servers.

          Coda filesystem

          Coda is a distributed file system that is based in one network and allows many computers to work with it simultaneously. The collected data is saved on a number of servers which adjust and assimilate the date between each other. You can then access the data with local and mobile computers.

          Command line parameters

          Command line parameters are transfer codes that transmit settings to computer programs. The commands used by the program are set in a command line.

          CPU usage

          The CPU usage shows the percentage of the calculating time of a computer. It describes the current state of the processors of a computer. If the computer needs a lot of calculating time for the coping of ongoing processes the CPU usage is very high. So the CPU usage is low if the calculating time is low.

          Drag & Drop Upload

          You can upload your file by dragging it in the meant field of the FAUbox.

          Drive letter

          The different drives of a computer (e.g. the CD/DVD-Drive) are represented by a letter. This letter is the drive letter.

          E2EE (End-to-End-Encryption)

          The End-to-End-Encryption is a method for encoding information in a data transfer. The software of the sender encrypts the information while the software of the receiver decrypts it.


          FAUbox-Admins are Employees of the regional computer center (RRZE) who have the authorization as administrator.

          FAUbox base folder

          The folder which the FAUbox Client automatically feels responsible for.
          Under Windows:C:\Users\<User>\FAUbox
          Under Linux/Mac OS :/home/<User>/FAUbox.

          FAUbox-user Identification

          <IdM-user ID>@<domain>:
          domain may be:

          Folder rights

          The folder rights are describing which rights every single member has to the folder. The owner or admin for example is able to delete top level folders, send invitations, remove members and send links to other users. Meanwhile folder-members without quota cannot do anything except for reading and downloading documents they have access to.

          Fuse filesystem

          FUSE is the short term for ‘filesystem in userspace’. It describes a kernel module that enables unprivileged users to create their own filesystems.

          HTTP protocol

          HTTP is the short term for ‘hypertext transfer protocol’. It’s a protocol  that divides different requests into independent transactions and is used for the data transmission to the application layer of a computer network. It is often used for the transmission of websites from the World Wide Web into a web browser.


          KDE is a graphical user interface of Linux.

          Multi source download

          It describes the process of concurrently downloading file parts from multiple sources for a single file. By using this download method the client is able to reduce the time required to download the file.

          NAT traversal connection

          NAT means ‘network address translation’. These are methods to connect different networks by changing the address information of the data packets.

          Online Backup

          This term describes a strategy for the data backup via the internet.


          On-Premise is a model describing the usage of computer programs and is run by the user on his own hardware.


          Orga-Admins are employees of a connected institution who have the authorization as administrators (usually an employee of the local RRZE)


          A peer-to-peer connection is a computer connection in which all participating computers are equal. Therefore every computer can provide services and has access to all services provided.


          A path is a string of characters that denotes a file, a directory, or other resources on a computer system, depending on the platform. The path length is then composed of the actual filename and the path of the directories.
          The path will look like this:
          Windows : d:\Program Files\ImageMagik\Photo\DSC.jpg
          Mac/Linux : /home/nutzername/medien/photo/Ausspieler/REDT/DSC.jpg

          Proxy detection

          Proxy detection decribes the process of the system identifying an internet computer network server which enables the client to send orders.

          SHA (Secure Hash Algorithm)

          SHA is a cryptologic hash-function that is used for data processing and the checking of the integrity of an information. The algorithm leads to a precised test value of digital data. This test value serves as a digital signature and guarantees the integrity of the data.

          SSL (Secure Socket Layer)

          SSL means Secure Socket Layer and is an encryption protocol for a secure data transfer.


          A subfolder is a folder in a level below the top level folder. All subfolders and the files saved in them have the same rights as the top level folder.

          System Service

          The Windows-System-Service is a program working in the background of Windows and providing the functionality of the operating system.


          A relay is an electromechanic button. It is activated through electric circuits and often used to change them.


          The RSA (Rivest Shamir Adleman) algorithm is the most common system for authentication and encryption in the internet.


          TCP means ‘transmission control protocol’. It is a protocol that is used for the data transfer over the internet.

          Terminal server

          The terminal server is a software that is installed on a central computer. This software provides different applications for a lot of clients.


          A Security-Token is a chain of encrypted information including the username, the Token-expire time and proprietary information. The Token is used for the authentication of users.

          Top-level Folder

          A Top Level Folder is a folder in the FAUbox that is placed directly under the FAUbox base folder. The rights for all files and all subfolders are saved in the top level folder.

          UNC (Universal Naming Convention)

          The Universal Naming Convention is a network path one can use to get access to the network of a computer without having to use a drive letter. It makes the direct connection to a network drive unnecessary.


          WAN is a short form for ‘wide area network’. It is a computer network that has no limit regarding connecting computers and is spread over a huge geographic area.

          ZIP compression

          On a Windows system it is possible to compress files and folders to ZIP folders. These ZIP folders have a space-saving file format and can be transferred very fast. Because of the compression the bytes that are included in the file are reduced while the content stays the same. To change the file to the original state the ZIP file has to be extracted.