%brandDTD; ] > Glossary

This glossary is provided for your information only; it is not meant to be relied upon as a complete or authoritative description of the terms defined below or of the privacy and/or security ramifications of the technologies described.


Glossary

authentication
The use of a password, certificate, personal identification number (PIN), or other information to validate an identity over a computer network.
bookmark
A stored web page address (URL) that you can go to easily by clicking a bookmark icon in the Bookmarks Toolbar or choosing the bookmark's name from the Bookmarks menu.
Bookmarks Toolbar
The customizable toolbar that appears just below the Location Bar by default in &brandShortName;. It contains buttons for your favorite bookmarks (or folders containing groups of bookmarks) that you can add or remove.
cache
A collection of web page copies stored on your computer's hard disk or in its random-access memory (RAM). &brandShortName; accumulates these copies as you browse the Web. When you click a link or type a URL to fetch a particular web page for which the cache already contains a copy, &brandShortName; compares the cached copy to the original. If there have been no changes, &brandShortName; uses the cached copy rather than refetching the original, saving processing and download time.
certificate
The digital equivalent of an ID card. A certificate specifies the name of an individual, company, or other entity and certifies that a public key, which is included in the certificate, belongs to that entity. When you digitally sign a message or other data, the digital signature for that message is created with the aid of the private key that corresponds to the public key in your certificate.
cipher
See cryptographic algorithm.
client
Software (such as an Internet browser) that sends requests to and receives information from a server, which is usually running on a different computer. A computer on which client software runs is also described as a client.
A small bit of information stored on your computer by some web sites. When you visit such a site, the site asks &brandShortName; to place one or more cookies on your hard disk. Later, when you return to the site, &brandShortName; sends the site the cookies that belong to it. Cookies help web sites keep track of information about you, such as the contents of your shopping cart. You can set your cookie preferences to control how cookies are used and how much information you are willing to let web sites store on them. See also foreign cookie.
The part of &brandShortName; that you can use to control cookies.
cryptographic algorithm
A set of rules or directions used to perform cryptographic operations such as encryption and decryption. Sometimes called a cipher.
cryptography
The art and practice of scrambling (encrypting) and unscrambling (decrypting) information. For example, cryptographic techniques are used to scramble and unscramble information flowing between commercial web sites and &brandShortName;.
decryption
The process of unscrambling data that has been encrypted. See also encryption.
digital ID
See certificate.
digital signature
A code created from both the data to be signed and the private key of the signer. This code is unique for each new piece of data. Even a single comma added to a message changes the digital signature for that message. Successful validation of your digital signature by appropriate software not only provides evidence that you approved the transaction or message but also provides evidence that the data has not changed since you digitally signed it. A digital signature has nothing to do with a handwritten signature, although it can sometimes be used for similar legal purposes.
distinguished name (DN)
A specially formatted name that uniquely identifies the subject of a certificate.
eavesdropping
Surreptitious interception of information sent over a network by an entity for whom the information is not intended.
encryption
The process of scrambling information in a way that disguises its meaning. For example, encrypted connections between computers make it very difficult for third-parties to unscramble, or decrypt, information flowing over the connection. Encrypted information can be decrypted only by someone who possesses the appropriate key.
Extensible Stylesheet Language Transformation (XSLT)
A language used to convert an XML document into another XML document or into another format.
Extensible Markup Language (XML)
An open standard for describing data. Unlike HTML, XML allows the developer of a web page to define special tags. For more information, see the online W3C document Extensible Markup Language (XML).
File Transfer Protocol (FTP)
A standard that allows users to transfer files from one computer to another over a network. You can use &brandShortName; to fetch files using FTP.
FIPS PUBS 140-1
Federal Information Processing Standards Publications (FIPS PUBS) 140-1 is a US government standard for implementations of cryptographic modules — hardware or software that encrypts and decrypts data or performs other cryptographic operations (such as creating or verifying digital signatures). Many products sold to the US government must comply with one or more of the FIPS standards.
A cookie from one site that gets stored on your computer when you visit a different site. Sometimes a web site displays content that is hosted on another Web site. That content can be anything from an image to text or an advertisement. The second Web site that hosts such elements also has the ability to store a cookie in &brandShortName;, even though you haven't visited it directly. Also known as "third-party cookie."
Form Manager
The part of &brandShortName; that can help you save the personal data you enter into online forms, such as your name, address, and phone number. Then, when a Web site presents you with a form, Form Manager can fill it in automatically.
helper application
Any application that is used to open or view a file downloaded by &brandShortName;. A plug-in is a special kind of helper application that installs itself into the Plugins directory of the main &brandShortName; installation directory and can typically be opened within &brandShortName; itself. Microsoft Word, Adobe Photoshop, and other external applications are considered helper applications but not plug-ins, because they don't install themselves into the browser directory but can be opened from the download dialog box.
home page
The page &brandShortName; is set to display every time you launch it or when you click the Home button. Also used to refer to the main page for a Web site from which you can explore the rest of the site.
Hypertext Markup Language (HTML)
The document format used for Web pages. The HTML standard defines tags, or codes, used to define the text layout, fonts, style, images, and other elements that make up a web page.
Also known as implied or "opt-out" consent. Used to describe privacy settings that may allow web sites to gather information about you (for example by means of cookies and online forms) unless you explicitly choose to withhold your consent by selecting an option on a page that the web site provides for that purpose. Your consent may not be requested when the information is actually gathered.
Internet Message Access Protocol (IMAP)
A standard mail server protocol that allows you to store all your messages and any changes to them on the server rather than on your computer's hard disk. Using IMAP rather than POP saves disk space and allows you to access your entire mailbox, including sent mail, drafts, and custom folders, from any location. Using an IMAP server over a modem is generally faster than using a POP mail server, since you initially download message headers only. Not all ISPs support IMAP.
Internet
A worldwide network of millions of computers that communicate with each other using standard protocols such as TCP/IP. Originally developed for the US military in 1969, the Internet grew to include educational and research institutions and, in the late 1990s, millions of businesses, organizations, and individuals. Today the Internet is used for email, browsing the World Wide Web, instant messaging, mailing lists and usegroups, and many other purposes.
Internet protocol address (IP address)
The address of a computer on a TCP/IP network. Every computer on the Internet has an IP address. Clients have either a permanent IP address or one that is dynamically assigned to them each time they connect with the network.
Java
A programming language developed by Sun Microsystems. A single Java program can run on many different kinds of computers, thus avoiding the need for programmers to create a separate version of each program for each kind of computer. After Java is installed, &brandShortName; can automatically download and run Java programs (also called applets).
JavaScript
A scripting language commonly used to construct web pages. Programmers use JavaScript to make web pages more interactive; JavaScript is often used to dynamically validate forms and select buttons. JavaScript can be used with Java, but it is technically a separate language. Java is not required for JavaScript to work correctly.
Lightweight Directory Access Protocol (LDAP)
A standard protocol for accessing directory services, such as corporate address books, across multiple platforms.
Location Bar
The field (and associated buttons) near the top of a &brandShortName; window where you can type a URL or search terms.
master password
A password used by Certificate Manager to protect the master key and/or private keys stored on a security device. Certificate Manager needs to access your private keys, for example, when you sign email messages or use one of your own certificates to identify yourself to a web site. It needs to access your master key when Password Manager or Form Manager reads or adds to your personal information. Each security device requires a separate master password.
The toolbar near the top of the &brandShortName; window that includes the Back and Forward buttons.
object signing
A technology that allows software developers to sign Java code, JavaScript scripts, or any kind of file, and that allows users to identify the signers and control access by signed code to local system resources.
object-signing certificate
A certificate whose corresponding private key is used to sign objects such as code files. See also object signing.
password-based authentication
Confident identification by means of a name and password. See also authentication.
Password Manager
The part of &brandShortName; that can help you remember some or all of your names and passwords by storing them on your computer's hard disk and entering them for you automatically when you visit such sites.
PKCS #11
The public-key cryptography standard that governs security devices such as smart cards.
Platform for Privacy Preferences (P3P)
A standard published by the World Wide Web Consortium (W3C) designed to help users to gain more control over the use of personal information by Web sites they visit. For general information on the standard itself, see the online document P3P Public Overview.
plug-in
A type of helper application that adds new capabilities to &brandShortName;, such as the ability to play audio or video clips. Unlike other kinds of helper applications, a plug-in application installs itself into the Plugins directory within the main &brandShortName; installation directory and typically can be opened within &brandShortName; itself (internally). For example, an audio plug-in lets you listen to audio files on a web page or in an e-mail message. Macromedia Flash Player and Java are both examples of plug-in applications.
Post Office Protocol (POP)
A standard mail server protocol that requires you to download new messages to your local computer — although you can choose to leave copies on the server. With POP you can store all your messages (including sent mail, drafts, and custom folders) on one computer only. By contrast IMAP allows you to permanently store all your messages and any changes to them on the server, where you can access them from any computer. Most ISPs currently support POP.
private key
One of a pair of keys used in public-key cryptography. The private key is kept secret and is used to decrypt data that has been encrypted with the corresponding public key.
proxy
An intermediary or "go-between" program that acts as both a server and a client for the purpose of making requests on behalf of other clients.
search engine
A web-based program that allows users to search for and retrieve specific information from the World Wide Web. The search engine may search the full text of web documents or a list of keywords; it may also use librarians who review web documents and index them manually for retrieval. Typically, the user types a word or phrase into a search box, and the search engine displays links to relevant web pages.
Secure Sockets Layer (SSL)
A protocol that allows mutual authentication between a client and a server for the purpose of establishing an authenticated and encrypted connection. SSL runs above TCP/IP and below HTTP, LDAP, IMAP, NNTP, and other high-level network protocols. The new Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL. See also authentication, encryption.
server
Software (such as software that serves up web pages) that receives requests from and sends information to a client, which is usually running on a different computer. A computer on which server software runs is also described as a server.
SSL
See Secure Sockets Layer (SSL).
Status Bar
The toolbar that appears at the bottom of any &brandShortName; window. It shows status icons on the left.
TCP
See Transmission Control Protocol/Internet Protocol (TCP/IP).
See foreign cookie.
TLS
See Secure Sockets Layer (SSL).
Transmission Control Protocol/Internet Protocol (TCP/IP)
A Unix protocol used to connect computers running a variety of operating systems. TCP/IP is an essential Internet protocol and has become a global standard.
Uniform Resource Locator (URL)
The standardized address that tells &brandShortName; how to locate a file or other resource on the Web (for example, http://www.mozilla.org). Type URLs into &brandShortName;'s Location Bar to access web pages. URLs are also used in the links on web pages go to other web pages. Also known as an Internet or Web address.
web page
A single document on the World Wide Web that is specified by a unique address or URL. A web page may contain text, hyperlinks, and graphics.
Web site
A group of related web pages linked by hyperlinks and managed by a single company, organization, or individual. A web site may include text, graphics, audio and video files, and links to other Web sites.
World Wide Web
Also known as the Web. A portion of the Internet that is made up of web pages stored by web servers and displayed by clients called web browsers (such as &brandShortName;).

Return to beginning of Glossary ]

26 November 2003

Copyright © 2003 Contributors to the Firebird Help Project.