- AES (Advanced Encryption Standard)
- Batch file
- Coda filesystem
- Command line parameters
- CPU usage
- Drag & Drop Upload
- Drive letter
- E2EE (End-to-End-Encryption)
- FAUbox base folder
- FAUbox-user identification
- Folder rights
- Fuse filesystem
- HTTP protocol
- Multi Source Download
- NAT traversal connection
- Online Backup
- Proxy Detection
- SHA (Secure Hash Algorithm)
- SSL (Secure Socket Layer)
- System Service
- Terminal Server
- Top-level folder
- UNC (Universal Naming Convention)
- ZIP Compression
AES (Advanced Encryption Standard)
The Advanced Encryption Standard is a method for encrypting information in order to transfer it safely. Because of the large key length, it offers a high rate of security for data transfer.
A Batch file is a Microsoft file that automates computer processes and executes them sequentially.
Boxcryptor is a software offering you to secure your cloud with an additional, user-friendly security layer by locally encrypting the files on your device.
The Client is a computer program that runs on terminal devices of a network and is connected to the server. It is able to use some services of the server and serves as an interface for communication between the program and the server.
A Cloud is a pool of configurable computing resources in which you can save local files and run programs that are not installed on your local servers.
Coda is a distributed file system that is based on one network and allows many computers to work with it simultaneously. The collected data is saved on a number of servers that adjust and assimilate the data between each other. You can then access the data with local and mobile computers.
Command line parameters
Command line parameters are transfer codes that transmit settings to computer programs. The commands used by the program are set in a command line.
CPU usage shows the percentage of the calculating time of a computer. It describes the current state of the processors of a computer. If the computer needs a lot of calculating time for the coping of ongoing processes the CPU usage is very high. So the CPU usage is low if the calculating time is low.
Drag & Drop Upload
You can upload your file by dragging it in the meant field of the FAUbox.
The different drives of a computer (e.g. the CD/DVD-Drive) are represented by a letter. This letter is the drive letter.
The End-to-End-Encryption is a method for encoding information in a data transfer. The software of the sender encrypts the information while the software of the receiver decrypts it.
FAUbox-Admins are Employees of the regional computer center (RRZE) who have the authorization as administrators.
FAUbox base folder
The folder which the FAUbox Client automatically feels responsible for.
Under Linux/Mac OS :/home/<User>/FAUbox.
domain may be:
The folder rights are describing which rights every single member has to the folder. The owner or admin for example is able to delete top-level folders, send invitations, remove members, and send links to other users. Meanwhile, folder members without quota cannot do anything except for reading and downloading documents they have access.
FUSE is the short term for ‘filesystem in userspace’. It describes a kernel module that enables unprivileged users to create their own filesystems.
HTTP is the short term for ‘hypertext transfer protocol’. It’s a protocol that divides different requests into independent transactions and is used for data transmission to the application layer of a computer network. It is often used for the transmission of websites from the World Wide Web into a web browser.
KDE is a graphical user interface of Linux.
It describes the process of concurrently downloading file parts from multiple sources for a single file. By using this download method the client is able to reduce the time required to download the file.
NAT traversal connection
NAT means ‘network address translation’. These are methods to connect different networks by changing the address information of the data packets.
This term describes a strategy for data backup via the internet.
On-Premise is a model describing the usage of computer programs and is run by the user on his own hardware.
Orga-Admins are employees of a connected institution who have the authorization as administrators (usually an employee of the local RRZE)
A peer-to-peer connection is a computer connection in which all participating computers are equal. Therefore every computer can provide services and has access to all services provided.
A path is a string of characters that denotes a file, a directory, or other resources on a computer system, depending on the platform. The path length is then composed of the actual filename and the path of the directories.
The path will look like this:
Windows : d:\Program Files\ImageMagik\Photo\DSC.jpg
Mac/Linux : /home/nutzername/medien/photo/Ausspieler/REDT/DSC.jpg
Proxy detection describes the process of the system identifying an internet computer network server that enables the client to send orders.
SHA (Secure Hash Algorithm)
SHA is a cryptologic hash-function that is used for data processing and the checking of the integrity of information. The algorithm leads to a precise test value of digital data. This test value serves as a digital signature and guarantees the integrity of the data.
SSL (Secure Socket Layer)
SSL means Secure Socket Layer and is an encryption protocol for a secure data transfer.
A subfolder is a folder a level below the top-level folder. All subfolders and the files saved in them have the same rights as the top-level folder.
The Windows-System-Service is a program working in the background of Windows and providing the functionality of the operating system.
A relay is an electromechanical button. It is activated through electric circuits and is often used to change them.
The RSA (Rivest Shamir Adleman) algorithm is the most common system for authentication and encryption on the internet.
TCP means ‘transmission control protocol’. It is a protocol that is used for data transfer over the internet.
The terminal server is software that is installed on a central computer. This software provides different applications for a lot of clients.
A Security-Token is a chain of encrypted information including the username, the Token-expire time, and proprietary information. The Token is used for the authentication of users.
A Top Level Folder is a folder in the FAUbox that is placed directly under the FAUbox base folder. The rights for all files and all subfolders are saved in the top-level folder.
UNC (Universal Naming Convention)
The Universal Naming Convention is a network path one can use to get access to the network of a computer without having to use a drive letter. It makes the direct connection to a network drive unnecessary.
WAN is a short form for ‘wide-area network’. It is a computer network that has no limit regarding connecting computers and is spread over a huge geographic area.
On a Windows system, it is possible to compress files and folders to ZIP folders. These ZIP folders have a space-saving file format and can be transferred very fast. Because of the compression, the bytes that are included in the file are reduced while the content stays the same. To change the file to the original state the ZIP file has to be extracted.