Update
The Oxford Biblical Studies Online and Oxford Islamic Studies Online have retired. Content you previously purchased on Oxford Biblical Studies Online or Oxford Islamic Studies Online has now moved to Oxford Reference, Oxford Handbooks Online, Oxford Scholarship Online, or What Everyone Needs to Know®. For information on how to continue to view articles visit the subscriber services page.
Dismiss

Overview

system administrator

Return to overview »

You are looking at 1-20 of 30 entries

View:

Active Server Pages

Active Server Pages  

(ASP)A technology from Microsoft to generate server-side dynamic web pages. Its core is an extension to HTML syntax that allows program fragments written in a scripting language (usually VBScript) to ...
administrative log-in

administrative log-in  

The process whereby the system administrator of a networked system carries out a log-in. Often, this form of log-in is carried out by the system administrator providing a well-known account name such ...
automatic lockout

automatic lockout  

Some operating systems allow the system administrator to specify the number of incorrect log-ins that are allowed to an account before the operating system prevents any more attempts to log-in, even ...
BOFH

BOFH  

Abbreviation for Bastard Operator From Hell. Often used to describe a system administrator who has little tolerance for inexperienced users and is occasionally used to describe heavy-handed ...
burglar alarm

burglar alarm  

Software that issues a warning when an intruder enters a computer system, such as by sending an email to the system administrator. Often used in conjunction with a honey pot.
change detection tool

change detection tool  

A software tool used by system administrators to check whether any sensitive files held in a networked system have been subject to unauthorized change. They are periodically used to check sensitive ...
crack root

crack root  

The successful intrusion of a UNIX system where the intruder somehow gains system administrator privileges The term ‘root’ is used to describe the highest level of privileges in UNIX.
depository directory

depository directory  

A directory which is created by a system administrator that can be used to store files created by the users of File Transfer Protocol software. Such directories are now frowned on by administrators ...
eavesdropping

eavesdropping  

The act of capturing data which is flowing through the communications media used by a computer network. There are a variety of methods used to eavesdrop ranging from gaining access to a system by ...
Finger

Finger  

Originally a program used by a system administrator which displayed the identities of all the users who were logged in to a network. It was based on the Finger program used in UNIX. However, the term ...
funeral attack

funeral attack  

An attack on a computer installation which uses old data. For example, an intruder may use an old password to enter a system: perhaps a password which was initially allocated to a system ...
load shedding

load shedding  

The process whereby a system administrator specifies that whenever a server load exceeds a certain number it processes no more requests for its service, and that such requests are either sent to ...
Microsoft Certified Systems Engineer

Microsoft Certified Systems Engineer  

A program run by the Microsoft corporation which certifies system administrators and network administrators. It has become the IT industry's leading training qualification.
munching

munching  

Taking advantage of the security holes in a computer system in order to enter the system illegally. Often such an intrusion is carried out for non-criminal reasons such as gaining a vicarious thrill ...
network administrator

network administrator  

A member of staff or group of staff who have the responsibility for the smooth functioning of a large network. They carry out a number of functions: defining and enforcing security policies, ...
packet sniffing

packet sniffing  

The process of illegally reading packets of data that travel through a network. There are a number of ways in which this can be done, ranging from pretending to be a system administrator and using ...
password cracker

password cracker  

A program which generates a large number of easily crackable passwords that might be employed by the users of a computer network. These programs are usually used by a system administrator to check ...
permissions

permissions  

Users of a networked system are granted a number of facilities by the system administrator when they are first registered with the system. These are known as permissions. There are a variety of ...
policy file

policy file  

A file which contains text describing the current security policies enforced in a network. Such files are usually set up by a system administrator. The file is consulted whenever a component of the ...
rogue access point

rogue access point  

An access point to a network that is not under the control of the system administrator of that network.

View: