G.4 certificate authority
Certificate authorities are trusted third parties. They can be root authorities (i.e. explicitly trusted).
They can have identities that can be verified by checking with other trusted certificate authorities
(such as the root authorities). Or you can choose to designate a CA as trusted (such as an authority
within your organization).
G.5 Classless Inter-Domain Routing
Classless Inter-Domain Routing (CIDR) is an internet address assignment and aggregation
strategy. CIDR, pronounced “cider” or “cedar”, is a refinement to the way IP addresses are
interpreted that replaces the previous generation of IP address syntax (the Class A, B, and C
addressing scheme). It allows greater flexibility when dividing ranges of IP addresses into separate
networks, thus providing more efficient use of increasingly scarce IPv4 addresses. The CIDR
strategy is described in
G.6 command and control center
A command and control center is a computer that controls a botnet. A command and control
center (C&C or C2) is a computer that controls a botnet (a network of compromised computers).
Some botnets use distributed command and control systems, making them more resilient. From
the command and control center, hackers can instruct multiple computers to perform their desired
activities. Command and control centers are often used to launch distributed denial-of-service
attacks because they can instruct a vast number of computers to perform the same action at the
same time.
G.7 eDirectory
A multi-platform server application from Novell that supports LDAP (Lightweight Directory Access
Protocol). eDirectory is a hierarchical, object-oriented database that allows access to LDAP clients.
G.8 FTP-over-HTTP
A configuration to proxy browser-based connections to FTP sites.
“FTP-over-HTTP” refers to proxying browser-based connections to FTP sites. It is not related to
FTP servers that provide HTTP front ends as an alternative (for example, as is done on many
open source mirror sites). “FTP-over-HTTP” works as follows:
1. Configure your browser to use the Web Appliance for FTP.
This will cause your browser to communicate to the proxy (Web Appliance) via HTTP for both
HTTP and FTP requests.
Sophos Web Appliance | Glossary | 231