AES (Advanced Encryption Standard)

          The Advanced Encryption Standard is a method for encrypting information in order to transfer it safely. Because of the large key length, it offers a high rate of security for data transfer.

          Batch file

          A Batch file is a Microsoft file that automates computer processes and executes them sequentially.


          The Client is a computer program that runs on terminal devices of a network and is connected to the server. It serves as an interface for communication between the program and the server.


          A Cloud is a pool of configurable computing resources in which you can save local files and run programs that are not installed on your local servers.

          Coda filesystem

          Coda is a distributed file system that is based on one network and allows many computers to work with it simultaneously. The collected data is saved on a number of servers that adjust and assimilate the data between each other. The data can then be accessed from local computers and mobile devices.

          Command line parameters

          Command line parameters are transfer codes that transmit settings to computer programs. The commands used by the program are set in a command line.

          CPU usage

          CPU usage shows the percentage of the calculating time of a computer. It describes the current state of the processors of a computer. If the computer needs a lot of calculating time for managing ongoing processes the CPU usage is very high. Therefore, the CPU usage is low if the calculating time is low.


          Cryptomator is a software that allows to secure the cloud with an additional, user-friendly security layer by locally encrypting the files on the device.

        • Drag & Drop Upload

        • A file can be uploaded by dragging it to the desired location in the FAUbox.

          Drive letter

          The different drives of a computer (e.g. the CD/DVD-Drive) are represented by a letter. This letter is referred to as the drive letter.

          E2EE (End-to-End-Encryption)

          The End-to-End-Encryption is a method for encoding information in a data transfer. The software of the sender encrypts the information while the software of the receiver decrypts it.


          FAUbox-Admins are employees of the regional computer center (RRZE) who have the authorization as administrators.

          FAUbox base folder

          The folder which the FAUbox Client automatically is responsible for.
          Under Windows:C:\Users\<User>\FAUbox
          Under Linux/Mac OS :/home/<User>/FAUbox.

          FAUbox-user Identification

          <IdM-user ID>@<domain>:
          “domain” may be:

          Folder rights

          The folder rights are the particular rights that each member respectively has in regards to the folder. The owner or admin for instance is able to delete top-level folders, send invitations, remove members, and send links to other users. Meanwhile, folder members without quota are merely able to read and download documents that they were given access to.

          Fuse filesystem

          FUSE is the short term for ‘filesystem in userspace’. It describes a kernel module that enables unprivileged users to create their own filesystems.

          HTTP protocol

          HTTP is the short term for ‘hypertext transfer protocol’. It’s a protocol that divides different requests into independent transactions and is used for data transmission to the application layer of a computer network. It is often used for the transmission of websites from the World Wide Web into a web browser.


          KDE is a graphical user interface of Linux.

          Multi-source download

          It describes the process of concurrently downloading file parts from multiple sources for a single file. By using this download method the client is able to reduce the time required to download the file.

          NAT traversal connection

          NAT means “network address translation”. These are methods to connect different networks by changing the address information of the data packets.

          Online Backup

          This term describes a strategy for data backup via the internet.


          On-Premise is a model describing the usage of computer programs and is run by the user on his own hardware.


          Orga-Admins are employees of a connected institution who have the authorization as administrators (usually an employee of the local RRZE)


          A peer-to-peer connection is a computer connection in which all participating computers are equal. Therefore every computer can provide services and has access to all services provided.


          A path is a string of characters that denotes a file, a directory, or other resources on a computer system, depending on the platform. The path length is then composed of the actual filename and the path of the directories.
          The path will look like this:
          Windows : d:\Program Files\ImageMagik\Photo\DSC.jpg
          Mac/Linux : /home/nutzername/medien/photo/Ausspieler/REDT/DSC.jpg

          Proxy detection

          Proxy detection describes the process of the system identifying an internet computer network server that enables the client to send orders.

          SHA (Secure Hash Algorithm)

          SHA is a cryptologic hash-function that is used for data processing and the checking of the integrity of information. The algorithm leads to a precise test value of digital data. This test value serves as a digital signature and guarantees the integrity of the data.

          SSL (Secure Socket Layer)

          SSL means Secure Socket Layer and is an encryption protocol for a secure data transfer.


          A subfolder is a folder a level below the top-level folder. All subfolders and the files saved in them have the same rights as the top-level folder.

          System Service

          The Windows-System-Service is a program working in the background of Windows and providing the functionality of the operating system.


          A relay is an electromechanical button. It is activated through electric circuits and is often used to change them.


          The RSA (Rivest Shamir Adleman) algorithm is the most common system for authentication and encryption on the internet.


          TCP means ‘transmission control protocol’. It is a protocol that is used for data transfer over the internet.

          Terminal server

          The terminal server is software that is installed on a central computer. This software provides different applications for a lot of clients.


          A security token is a chain of encrypted information including the username, the token expiration time, and proprietary information. The token is used for the authentication of users.

          Top-level folder

          A top-level folder is a folder in the FAUbox that is placed directly under the FAUbox base folder. The rights for all files and all subfolders are saved in the top-level folder.

          UNC (Universal Naming Convention)

          The Universal Naming Convention is a network path one can use to get access to the network of a computer without having to use a drive letter. It makes the direct connection to a network drive unnecessary.


          WAN is a short form for “wide-area network”. It is a computer network that has no limit regarding connecting computers and is spread over a large geographic area.

          ZIP compression

          On a Windows system, it is possible to compress files and folders to ZIP folders. These ZIP folders have a space-saving file format and can be transferred very fast. Because of the compression, the bytes that are included in the file are reduced while the content remains the same. To change the file to the original state, the ZIP file has to be extracted.