alphanumeric

Consisting of any of the letters of the English alphabet and the numbers 0 through 9.

authentication

The process of verifying that an individual truly is who he or she claims to be. Supplying a password is a very common method of authentication.

cipher

An algorithm used to encrypt data at varying levels of security. Examples include 3DES, AES, Blowfish, RC4, and Twofish.

client

A computer or application that uses services provided by a server.

color scheme

A combination of session settings that specify a variety of colors associated with the terminal window, including foreground and background.

connection

A data path or circuit between two computers over a phone line, network cable, or other media.

data integrity

The concept that information can be verified as original and unaltered. If data integrity is ensured, information can only be modified by those with proper authorization.

data privacy

The concept that data should only be viewed or accessed by those with authorization to do so. Data privacy is achieved using a cipher to encrypt data.

disconnect

To close a communication connection between a  client and a server.

dot files

Files having filenames that begin with a dot (.)

encryption

The process of converting a data transmission into a secret format that cannot easily be read by unauthorized individuals.  See also: decryption.

FTP

FTP is an abbreviation for the File Transfer Protocol; a protocol used to transfer files between computers on a TCP/IP network.

host key database

The repository for host keys sent to SecureFX by SSH servers that it has connected to. These keys are used to authenticate the server.

identity file

Identity files are two files containing the public-private key pair  used to connect  to an SSH server using RSA or DSA authentication. The Identity.pub file contains  only the public key and is uploaded to the SSH server. The corresponding Identity  file contains both public and private keys. Though \"identity\" is usually the name  given to identity files other file names can be used.

IP address

Every site that is reachable on the Internet must have a valid IP, or Internet Protocol,address. An IP address should be entered as four numbers separated by period (.) characters (for example: 198.105.232.1).

MAC

Message Authentication Code: A component of the SSH2 protocol consisting of a  hashing algorithm used to ensure data integrity between an SSH2 client and an SSH2  server communicating over a network connection. The MAC ensures data integrity by protecting against message alteration.

passphrase

A password used to protect a private key from unauthorized use. It is recommended that a passphrase be assigned to all private keys to prevent unauthorized use, especially in environments where multiple individuals have access to the machine on which the private key files are stored.

PKCS #11

An API defining a generic interface to cryptographic tokens.

PKCS #12 file

A PKCS #12 file is a file that contains your X.509 certificate and its associated private key.

port forwarding

The concept of connecting a logical port on a local machine to a port on a remote machine over a secure (encrypted) channel.  All requests for services sent to the local port are then forwarded across the secure channel to the corresponding port on the remote machine.

public-private key pair

A pair of keys used with RSA or DSA  authentication. The public key is usually kept in a file named Identity.pub, which is then transferred to the remote SSH server. Another file usually named Identity contains both the public key and the corresponding private key. This file is kept on the local machine and is used by SecureFX with public key or RSA authentication methods.

server

A computer program that provides services to other computer programs (called clients).Often the computer on which a server program runs is also called a server. The term host is often used as a synonym for server.

session

A session is a set of options that are assigned to a connection to a remote machine in SecureFX. These settings and options are saved under a session name and allow the user to have different preferences for different hosts.

session name

The label assigned to a session. For example, a user might use \"Accounting DB\" as a session name for a session that connects to sales.mycompany.com.

SFTP

SFTP is an abbreviation for the Secure Shell File Transfer Protocol; a secure version of the FTP protocol which is used to transfer files between computers on a network.

SSH

SSH is an acronym for the Secure Shell protocol. A communications protocol used to encrypt network traffic between a client and a server.

SSH1

The first version of the SSH protocol which provides a way to encrypt network traffic between a client and a server.

SSH2

The second version of the SSH protocol which provides a way to encrypt network traffic between a client and a server, with a slightly different set of security features (including SFTP) than the SSH1 protocol provides.

TAPI

Telephony API.  A standard developed by Intel and Microsoft that manages access to phone lines on a Windows PC.  This terminal emulation application uses TAPI to provide phone dialer options.  TAPI compliant programs can be running at the same time, using the modem to dial out or receive calls on an \"as needed\" basis.

TCP/IP

Transmission Control Protocol/Internet Protocol: TCP/IP is the basic communication method used over the Internet. The TCP on the side of the sending machine is responsible for breaking up a message in to smaller portions called packets. These packets are then sent to their destination and the TCP on the side of the receiving machine is responsible for reassembling the packets to form the original message. The Internet Protocol provides a means of properly addressing each packet so that it arrives at its destination. SSH and FTP, for example, are built upon TCP/IP.

Telnet

Telnet is a protocol that provides an interface for communications between clients and servers.

terminal

A device usually consisting of a keyboard, a display unit such as a cathode ray tube,and a serial port used for entering and sending data to a computer and displaying any data received from the computer. Terminals are usually connected to a computer a serial line or some other type of connection. There are many terminal types including VT100, VT102, VT220, and others.

terminal emulator

A program that emulates a terminal.

X11 forwarding

The process of transporting X11 data over an encrypted channel from a remote machine to a local machine.