| Abstract Syntax Notation One (ASN.1)
 | A language used to define the structure and content of objects such
      as data records and protocol messages, along the lines of a
      super-duper version of the typedef in C, only a lot more
      powerful.  ASN.1 was developed as part of the Open Systems
      Interconnection (OSI) environment, and was originally used for
      writing specifications.  More recently, though, tools have been
      developed that will generate software from ASN.1. See also: Distinguished Encoding Rules
      Web reference: The ASN.1 Consortium (http://www.asn1.org/)
 
 | 
|---|
    | Astoundium | The element of suprise. 
 | 
|---|
    | Attacker | In this context, one who attacks a computer system either to gain
      access or, as in a "Denial of Service attack", to cause a
      failure in the system or data loss. See also: Cracker
      
 | 
|---|
    | Backup Browser | Browser nodes which are not elected to be the Local Master Browser
      may be called upon to store a backup Browse List and to respond to a
      client request for a copy of the Browse List.  These hosts are
      called Backup Browsers. See also: Local Master Browser
      
 | 
|---|
    | Backup Domain Controller (BDC)
 | A Windows NT Domain Controller (DC) which keeps a backup copy of the
      user/group authentication database in an NT Domain.  The master copy
      is maintained by the Primary Domain Controller (PDC).  A Backup
      Domain Controller can be promoted to the role of PDC in a pinch.
      Only one PDC is permitted per NT Domain, but there may be any number
      of BDCs. See also: Domain Controller,
                      Primary Domain Controller
      
 | 
|---|
    | BAF Protocol | The very first name for the protocol formerly known as SMB.  The SMB
      protocol was originally developed by Dr. Barry A. Feigenbaum at IBM
      and, according to legend, was originally given his initials.  It was
      later renamed SMB and, more recently, CIFS. See also: CIFS, SMB
      
 | 
|---|
    | Bran | Pronounced Brahhn.  The name of my dog. 
 | 
|---|
    | Browser Node | See: Potential Browser 
 | 
|---|
    | Browser Election | The process by which a browser node on a NetBIOS LAN is chosen to be
      the primary repository of service information for that LAN (that is,
      the Local Master Browser).  Under NBT, the election process takes
      place within the confines of the local IP subnet. 
 | 
|---|
    | CIFS | Common Internet File System.  The
      protocol formerly known as Server Message Block (SMB) and, before
      that, as the BAF protocol (after its original creator, Dr. Barry
      Feigenbaum).  CIFS is a protocol for file and device sharing
      across a network. See also: SMB
      
 | 
|---|
    | Cracker | One who attacks a system in an effort to break security, probably to
      gain unauthorized access. Goodguy crackers (sometimes called "White Hat" crackers)
      used to provide the very beneficial service of exposing weaknesses
      so that they could be fixed, but then the US Congress enacted the
      Digital Millennium Copyright Act (DMCA) which made talking about
      such things illegal in the US and potentially dangerous elsewhere1.
       See also: Attacker
      Do not see also: Hacker
 
 | 
|---|
    | Distinguished Encoding Rules (DER)
 | A set of rules for encoding and decoding ASN.1 data for network
      transport.  DER provides a standard format for transport of data
      over a network so that the receiving end can convert the data back
      into their correct ASN.1 format.  DER is a specialized form of a
      more general encoding known as BER (Basic Encoding
      Rules).  DER is designed to work well with security
      protocols, and is used for encoding Kerberos and LDAP exchanges. See also: ASN.1, Kerberos, LDAP
      
 | 
|---|
    | Domain Controller (DC)
 | An authentication server in a WindowsNT or Windows2000 Domain.
      A Domain Controller (DC) maintains a database of user, group, and
      machine accounts and other security information, and provides
      authentication services to the NT or W2K Domain. In an NT Domain, one of the DCs will be designated the
      Primary Domain Controller (PDC).  All security database
      administration is handled via the PDC, and copies of the database
      are then distributed to any available Backup Domain
      Controllers (BDCs).  NT Domain controllers register the Group
      Special NetBIOS name nt_domain<1C> to identify
      themselves.
       In Windows2000 Domains the security database is stored in the
      Active Directory, and there is no distinction between primary and
      secondary controllers.
       See also: Backup Domain Controller,
                      Primary Domain Controller
      
 | 
|---|
    | Domain Name System (DNS)
 | The Domain Name System is a distributed database system that
      provides mappings between Internet names and Internet Protocol (IP)
      addresses.  The DNS name space is hierarchical in structure.
       Web reference: the DNS Resources Directory (http://www.dns.net/dnsrd/)
      
 | 
|---|
    | Domain Master Browser (DMB)
 | A host system that is designated to coordinate Browse Lists for
      matching workgroups across multiple subnets.  The DMB receives
      subnet Browse List updates from Local Master Browsers, combines
      those lists, and distributes the combined list back to the Local
      Masters for the workgroup. See also: Local Master Browser
      
 | 
|---|
    | Doveryay, no proveryay | Trust, but verify. 
 | 
|---|
    | Encoded NBT Name | The term used in this text for the fully qualified Second Level
      Encoded form of the NetBIOS Name and Scope ID.  For example, the
      string 
        "\x20EGEFCACACACACACACACACACACACACACA\x2FI\x2FO\x3FUM\0"
       is the fully encoded form of the NetBIOS name FE<20>
      and the scope ID "FI.FO.FUM".
       See also: NBT Name,
         First Level Encoding,
         Scope ID,
         Second Level Encoding
      
 | 
|---|
    | First Level Encoding | The conversion of a NetBIOS name to a format complying with
       DNS "best practices". NetBIOS names may contain characters which are not considered
       valid for use in DNS names, yet RFC 1001 and RFC 1002 attempted to
       map the NetBIOS name space into the DNS name space.  To work around
       this conflict, NetBIOS names are encoded by splitting each byte of
       the name into two nibbles and then adding the value of 'A' (0x41).
       Thus, the '&' character (0x26) would be encoded as "CG".
       NetBIOS names are usually padded with spaces before being encoded.
        In this book, the term "NBT Name" is used to indicate
       the fully qualified form of the First Level Encoded name.  The NBT
       Name includes the Scope ID.
       See also: NBT Name,
         Scope ID,
         Second Level Encoding
      
 | 
|---|
    | GSS-API | Generic Security Service Application
      Program Interface.  A generic interface to a set of
      security services.  It makes it possible to write software that does
      not care what the underlying security mechanisms actually are. See: RFC
         2078
      See also: SPNEGO
 
 | 
|---|
    | Hacker | One who fiddles with an existing system to see if it can be
      improved.  Hacking is generally the fine art of [creating and]
      recursively revising software or a software-based system. Do not see also: Cracker
      
 | 
|---|
    | Kerberos | A network authentication service developed at MIT and later adopted
      by Microsoft for use with Windows2000 and SMB over naked TCP/IP
      transport. See: RFC
         1510
      
 | 
|---|
    | LANA | NetBIOS LAN Adapter card. For the original PC Network System, IBM sold both Broadband and
      Baseband network interface cards, which they called LAN Adapters.
      The NBT system supports the concept of a "virtual LANA".
       See also: NBT
      
 | 
|---|
    | LDAP | The Lightweight Directory Access Protocol.
      A standard protocol used to access directory services based on the
      X.500 directory service model (eg., Novell Directory Services and
      Microsoft Active Directory). See: RFC
      2251
      
 | 
|---|
    | Local Master Browser (LMB)
 | A host system that is "elected" to manage the Browse List
      for the local IP LAN.  The LMB collects service announcements
      from servers on the local LAN, distributes the Browse List to any
      Backup Browsers on the LAN, and exchanges service lists with the
      Domain Master Browser (if there is one). See also: Domain Master Browser,
                      Backup Browser
      
 | 
|---|
    | Machine Name | Host name.  A name which is typically assigned in the system
      configuration and used as the base name creating the NetBIOS names
      of several important services.  The service names are composed by
      appending a service-specific suffix to the machine name. 
 | 
|---|
    | Master Browser | A common short-hand for "Local Master Browser". See: Local Master Browser
      
 | 
|---|
   | MIDL | Microsoft Interface Definition Language.
      Microsoft's version of the Interface Definition
      Language (IDL).  MIDL is used to specify the parameters to
      MS-RPC function calls.  MIDL is also used to define the interfaces
      to Microsoft Dynamically Linked Library (DLL)
      functions. See also: MS-RPC
      
 | 
|---|
    | Moore's Law | The observation (by Gordon Moore) that the transistor density on
      computer chips doubles roughly every 1.5 years.  This is generally
      taken to mean that processing speeds also double every 1.5 years.
      Software developers compensate by writing bad code and adding
      unnecessary features to maintain status quo. 
 | 
|---|
    | MS-RPC | Microsoft Remote Procedure Call.
      RPC in general is a system that allows a process on one system to
      make function calls against libraries on another system.  MS-RPC is
      Microsoft's implementation of RPC. See also: MIDL
      
 | 
|---|
    | Naked TCP | SMB transport over TCP/IP without the NBT NetBIOS emulation layer. SMB is traditionally passed via the NetBIOS API to an underlying
      transport protocol.  SMB over "naked" or "raw" TCP
      does not require the use of the NetBIOS API or NetBIOS emulation at
      the transport level.
       See also: NBT, NetBIOS
      
 | 
|---|
    | NBDD | NetBIOS Datagram Distribution
      Server.  This server relays broadcast and multicast (group)
      datagrams to all intended recipients. When a P, M, or H node wishes to send a broadcast or multicast
      datagram, it will send the datagram to the NBDD.  The NBDD will
      obtain the list of destination IPs from the NBNS and then unicast
      the datagram to each of those nodes.
       Most implementations do not provide NBDD support.
       See also: NBNS
      
 | 
|---|
    | NBNS | NetBIOS Name Server.  A server
      providing NetBIOS name to IP address mapping.  The NBNS is part
      of the NBT mechanism and does not need to participate directly in
      the NetBIOS LAN. See also: WINS
      
 | 
|---|
    | NBT | NetBIOS over TCP/IP; also known as NetBT
      and, less commonly, as TCPBEUI.  NBT is an implementation of the
      NetBIOS API on top of a TCP/IP transport layer. 
 | 
|---|
    | NBT Name | The term used in this text for the fully qualified First Level
      Encoded form of the NetBIOS Name and Scope ID.  For example, the
      NBT name: 
        EGEFCACACACACACACACACACACACACACA.FI.FO.FUM
       is composed of the NetBIOS name FE<20> and the scope
      ID "FI.FO.FUM".
       See also: Scope ID,
         First Level Encoding
      
 | 
|---|
    | NetBEUI | NetBIOS Extended User Interface. Also known as NetBIOS Frame Protocol (NBF).
      NetBEUI provides a simple mapping of NetBIOS API parameters and data
      to a transport suitable for passing messages on Ethernet and Token
      Ring networks.
       Web reference: NetBIOS NetBEUI NBF Networking, by
         Timothy D. Evans. (http://ourworld.compuserve.com/homepages/timothydevans/contents.htm)
      
 | 
|---|
    | NetBIOS | Network Basic Input Output System. NetBIOS is the Application Programming
      Interface (API) to a proprietary LAN system that was
      developed by IBM and Sytek.  The NetBIOS API has been implemented on
      top of several different network transports including TCP/IP, DECnet,
      IPX/SPX, and others.
       See also: NBT,
                      NetBT
      
 | 
|---|
    | NetBT | NetBIOS over TCP/IP.  Better known as NBT. See: NBT
      
 | 
|---|
    | Network Data Representation (NDR)
 | The on-the-wire encoding for parameters passed via MS-RPC.  MS-RPC
      input parameters are marshalled into NDR format for transmission
      over the network, and then unmarshalled on the server side.  The
      process is then reversed to return the results. See also: MS-RPC
      
 | 
|---|
    | NT Domain | A Workgroup with a Domain Controller. See also: Domain Controller,
                      Workgroup
      
 | 
|---|
    | Phrep | An expletive, roughly equivalent to "dang", "drat",
      or "bother", but without connotation. 
 | 
|---|
    | Primary Domain Controller (PDC)
 | A Windows NT Domain Controller (DC) which keeps the master copy of
      the user/group authentication database in an NT Domain.  Only one
      PDC is permitted per NT Domain.  In addition to registering the
      nt_domain<1C> Group Special name, the PDC also
      registers the unique nt_domain<1B> NetBIOS name
      (where nt_domain is the name of the NT Domain).  Microsoft's
      WINS server ensures that the IP address registered to the
      nt_domain<1B> name is always at the top of the list of
      IPs associated with the nt_domain<1C> Group Special
      name. See also: Backup Domain Controller,
                      Domain Controller
      
 | 
|---|
    | Potential Browser | Any node on a local IP LAN that is willing and able to participate
      in browser elections and take on the role of Local Master Browser or
      Backup Browser. See also: Local Master Browser, Backup Browser
      
 | 
|---|
    | Scope ID | A string of dot-separated labels, formatted per DNS naming rules.
      The Scope ID defines a virtual NBT LAN by dividing the NetBIOS
      namespace.
       See also: NBT Name,
         DNS,
         First Level Encoding,
         Second Level Encoding
      
 | 
|---|
    | Second Level Encoding | The on-the-wire format of an NBT name.  The encoding scheme replaces
      the familiar dot characters used in DNS names with a byte containing
      the length of the next label.  The Second Level Encoded form of the
      NBT Name 
        EGEFCACACACACACACACACACACACACACA.FI.FO.FUM
       would be
       
        "\x20EGEFCACACACACACACACACACACACACACA\x02FI\x02FO\x03FUM\0"
       See also: NBT Name,
         DNS,
         First Level Encoding
      
 | 
|---|
    | Server Message Block (SMB)
 | A file and print-sharing protocol developed by IBM, Intel, 3Com, and
      Microsoft for use with PC-DOS and MS-DOS.  It has since been renamed
      CIFS. Also a name for the messages exchanged by the SMB or CIFS
      protocol.  An SMB message is often referred to simply as "an
      SMB".
       See also: CIFS
      
 | 
|---|
    | Server Service | An SMB filesharing service provider.  The Server Service registers a
      NetBIOS name consisting of the machine name with a suffix value of
      0x20.  On many platforms, the Server Service will also accept NBT
      connection requests with a CALLING NAME of
      *SMBSERVER<20>. 
 | 
|---|
    | Simple Protected Negotiation (SPNEGO)
 | The "Simple and Protected GSS-API Negotiation Mechanism"
      is a protocol used with GSS-API to negotiate authentication
      mechanisms between a client and server.
       See: RFC
         2478
      See also:  GSS-API
 
 | 
|---|
    | Suffix Byte | The sixteenth byte of a NetBIOS name.  This byte is used to indicate
      the type of service that has registered the name. See also: Appendix C: Known NetBIOS
                      Suffix Values
      
 | 
|---|
    | TCPBEUI | Yet another name for NBT.  The name TCPBEUI is
      primarily used by folks from IBM. See: NBT
      
 | 
|---|
    | Thermomostat | The internal sensor that causes your mother to tell you to put on
      a sweater when she is cold. 
 | 
|---|
    | WINS | Windows Internet Name Service.
      Microsoft's name for their NBNS
      implementation. See: NBNS
      
 | 
|---|
    | Workgroup | An NT Domain without a Domain Controller. The distinction between an NT Domain and a Workgroup is blurry.
      The two are basically the same thing, except that an NT Domain has a
      Domain Controller, which provides authentication services.  The
      Primary Domain Controller also always runs the Domain Master Browser
      (DMB) service, which coordinates the workgroup Browse Lists across
      subnets.
       See also: Domain Master Browser,
                      Domain Controller,
                      Primary Domain Controller
      
 | 
|---|