Czech | English |
Agent čtečky protokolů | Log Reader Agent (In Replication, the executable that monitors the transaction of each database configured for transactional replication, and copies the transactions marked for replication from the transaction into the distribution database) |
akce protokolu SOAP | SOAP action (A parameter that can be used to specify a URI that identifies the intent of a SOAP message) |
anonymní ověřování protokolu FTP | anonymous FTP authentication (A protocol that makes it possible for a user to retrieve documents, files, programs, and other archived data from anywhere on the Internet without having to establish a logon name and password) |
aplikační protokol | application log (A record of events that are generated by the applications running on a system) |
chyba protokolu SOAP | SOAP fault (A collection of elements in a SOAP message that identify the code and cause of an error) |
depeše protokolu SNMP | SNMP trap (An unsolicited Simple Network Management Protocol (SNMP) packet sent from one SNMP entity to another usually in response to a stimulus or an event on the sending entity) |
depeše protokolu SNMP | Simple Network Management Protocol trap (An unsolicited Simple Network Management Protocol (SNMP) packet sent from one SNMP entity to another usually in response to a stimulus or an event on the sending entity) |
doručovací protokol | delivery protocol (The set of communication rules used to route notification messages to external delivery systems) |
duální sada protokolů | dual stack (For Windows CE .NET, an IP protocol stack that supports IPv4 and IPv6 independently or jointly. The DNS name resolution may yield both IPv4 and IPv6 addresses. Algorithms are used to determine source and destination addresses, thus determining which stack - IPv4 or IPv6 - to use) |
hromadná záloha protokolů | bulk log backup (A backup that includes log and data pages changed by bulk operations. Point-in-time recovery is not allowed) |
hromadné zálohování protokolů | bulk log backup (A backup that includes log and data pages changed by bulk operations. Point-in-time recovery is not allowed) |
identifikátor URI protokolu pack | pack URI (" A Uniform Resource Identifier (URI) based on the "pack://" URI scheme and RFC2396 standard. Similar to an " http://" URI, a "pack://" URI identifies an entity that holds a collection of relevant parts.") |
komponenta naslouchající protokolu | log listener (A component that hooks up to a log object) |
konfigurace přesouvání protokolu | log shipping configuration (A single primary server, one or more secondary servers (each with a secondary database), and a monitor server) |
Konzola pro správu protokolu SNMP | SNMP Management Console (The interface through which a manager, either a user or a program, performs management activities) |
mezipaměť protokolu ARP | ARP cache (A table of Internet Protocol version 4 (IPv4) addresses and their corresponding media access control (MAC) address. There is a separate ARP cache for each interface) |
modul plug-in řídicího protokolu | control protocol plug-in (A type of plug-in that enables a Windows Media server to communicate with clients and other servers through different network protocols) |
objekt protokolu IP | IP object (A performance object that includes counters that describe the rates at which internet protocol (IP) datagrams are transmitted by a computer using the IP protocol. It also describes various error counts for the IP protocol) |
Ochrana protokolu IPsec proti útokům DoS | IPsec Denial of Service Protection (A feature that helps client machines to provide basic protection against denial-of-service attacks) |
Ochrana protokolu IPsec proti útokům s cílem způsobit odepření služby | IPsec Denial of Service Protection (A feature that helps client machines to provide basic protection against denial-of-service attacks) |
odběr protokolu POP | POP subscription (A subscription that gathers messages from POP3 mailboxes and delivers the messages to a designated Outlook Live mailbox so that the Outlook Live end user can centralize their e-mail accounts and only have to check one mailbox) |
operační protokol | operational log (A log that contains information about operations carried out by a computer in the process of executing a program) |
ověřování protokolem TLS | TLS authentication (Authentication by using the Transport Layer Security (TLS) protocol) |
partnerský uzel protokolu BGP | BGP peer (A peer connected to other peers on the Border Gateway Protocol level) |
položka protokolu | log entry (A record in a log file) |
protokol AFTP | AFTP (A file transfer protocol used in IBM host systems, the IBM Advanced Program-to-Program Communications equivalent to the TCP/IP File Transfer Protocol) |
protokol AFTP | Advanced Program-to-Program Communication File Transfer Protocol A file transfer protocol used in IBM host systems, the IBM Advanced Program-to-Program Communications equivalent to the TCP/IP File Transfer Protocol (Advanced Program-to-Program Communication File Transfer Protocol) |
protokol akcí | action log (A record of the actions that have been taken during the lifetime of an incident to resolve the incident. Examples include comments by the analyst, communications from the user, attachments, and task outputs) |
protokol aktivit | activity log (A historic record of the state of a source document) |
protokol ARP | ARP (In TCP/IP, a protocol that uses broadcast traffic on the local network to resolve a logically assigned Internet Protocol version 4 (IPv4) address to its physical hardware or media access control (MAC layer address). In asynchronous transfer mode (ATM), ARP is used two different ways. For classical IPv4 over ATM (CLIP), ARP is used to resolve addresses to ATM hardware addreses. For ATM LAN emulation (LANE), ARP is used to resolve Ethernet/802.3 or Token Ring addresses to ATM hardware addresses) |
protokol ARP | Address Resolution Protocol In TCP/IP, a protocol that uses broadcast traffic on the local network to resolve a logically assigned Internet Protocol version 4 (IPv4) address to its physical hardware or media access control (MAC layer address). In asynchronous transfer mode (ATM), ARP is used two different ways. For classical IPv4 over ATM (CLIP), ARP is used to resolve addresses to ATM hardware addreses. For ATM LAN emulation (LANE), ARP is used to resolve Ethernet/802.3 or Token Ring addresses to ATM hardware addresses (Address Resolution Protocol) |
protokol auditování poštovní schránky | mailbox audit log (A log that is generated for each mailbox that has mailbox audit logging enabled. Log entries are stored in the Audits subfolder of the audited mailbox Recoverable Items folder) |
protokol auditování správce | administrator audit log (An auditing record that records any action, based on a Windows PowerShell cmdlet, performed by an administrator. This can help the administrator troubleshoot configuration issues or identify the cause of security- or compliance-related problems) |
protokol AuthIP | AuthIP (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements) |
protokol AuthIP | Authenticated IP A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements (Authenticated IP) |
protokol AuthIP | Authenticated Internet Protocol A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements (Authenticated Internet Protocol) |
protokol BAP | BAP (A Point-to-Point Protocol (PPP) control protocol that is used on a multiprocessing connection to dynamically add and remove links) |
protokol BAP | bandwidth allocation protocol A Point-to-Point Protocol (PPP) control protocol that is used on a multiprocessing connection to dynamically add and remove links (Bandwidth Allocation Protocol) |
protokol BIND | BIND (An implementation of Domain Name System (DNS) written and ported to most available versions of the UNIX operating system. The Internet Software Consortium maintains the BIND software) |
protokol BIND | Berkeley Internet Name Domain An implementation of Domain Name System (DNS) written and ported to most available versions of the UNIX operating system. The Internet Software Consortium maintains the BIND software (Berkeley Internet Name Domain) |
protokol BOOTP | BOOTP (A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and 1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol. The Microsoft DHCP service provides limited support for BOOTP service) |
protokol CBCP | Callback Control Protocol The Network Control Protocol that negotiates the use of callback over PPP links (Callback Control Protocol) |
protokol CBCP | CBCP (The Network Control Protocol that negotiates the use of callback over PPP links) |
protokol CHAP | CHAP (A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response) |
protokol CHAP | Challenge Handshake Authentication Protocol A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response (Challenge Handshake Authentication Protocol) |
protokol chyb | error log (A file that lists errors that were encountered during an operation) |
protokol clusteru | cluster log (A trace log of Cluster service events and activities on a node) |
protokol DCTCP | DCTCP (A TCP-like protocol for data center networks which leverages Explicit Congestion Notification (ECN) in the network to provide multi-bit feedback to the end hosts) |
protokol DCTCP | Data Center Transmission Control Protocol A TCP-like protocol for data center networks which leverages Explicit Congestion Notification (ECN) in the network to provide multi-bit feedback to the end hosts (Data Center Transmission Control Protocol) |
protokol DCTCP | Data Center TCP A TCP-like protocol for data center networks which leverages Explicit Congestion Notification (ECN) in the network to provide multi-bit feedback to the end hosts (Data Center TCP) |
protokol DHCP | Dynamic Host Configuration Protocol A TCP/IP service protocol that offers dynamic leased configuration of host IP addresses and distributes other configuration parameters to eligible network clients. DHCP provides safe, reliable, and simple TCP/IP network configuration, prevents address conflicts, and helps conserve the use of client IP addresses on the network (Dynamic Host Configuration Protocol) |
protokol DHCP | DHCP (A TCP/IP service protocol that offers dynamic leased configuration of host IP addresses and distributes other configuration parameters to eligible network clients. DHCP provides safe, reliable, and simple TCP/IP network configuration, prevents address conflicts, and helps conserve the use of client IP addresses on the network) |
protokol Digest Access | Digest Access protocol (A lightweight authentication protocol for parties involved in communications that are based on Hypertext Transfer Protocol (HTTP) or Simple Authentication and Security Layer (SASL)) |
protokol DRT | DRT protocol (The protocol used to exchange cache information and find routes in the DRT mesh) |
protokol ECP | Encryption Control Protocol The Network Control Protocol for negotiating the use of encryption over PPP links. ECP is defined in RFC 1968 (Encryption Control Protocol) |
protokol ECP | ECP (The Network Control Protocol for negotiating the use of encryption over PPP links. ECP is defined in RFC 1968) |
protokol Exchange ActiveSync | Exchange ActiveSync (A protocol that makes it possible for users to sync their e-mail, calendar, contact, and task data from Exchange Server to supporting devices) |
protokol FTP | FTP (A member of the TCP/IP suite of protocols, used to copy files between two computers on the Internet. Both computers must support their respective FTP roles: one must be an FTP client and the other an FTP server) |
protokol FTP | File Transfer Protocol A member of the TCP/IP suite of protocols, used to copy files between two computers on the Internet. Both computers must support their respective FTP roles: one must be an FTP client and the other an FTP server (File Transfer Protocol) |
protokol HCAP | Host Credentials Authorization Protocol A protocol used by Access Control Server (ACS) to send and receive statements of health to and from other NAP infrastructure components. HCAP is installed on NPS so that it can function with Access Control Server (ACS) (Host Credentials Authorization Protocol) |
protokol HCAP | HCAP (A protocol used by Access Control Server (ACS) to send and receive statements of health to and from other NAP infrastructure components. HCAP is installed on NPS so that it can function with Access Control Server (ACS)) |
protokol HCEP | Health Certificate Enrollment Protocol The protocol used by the NAP agent to request health certificates from the Health Registration Authority (HRA) and to prove the health of a client computer (Health Certificate Enrollment Protocol) |
protokol HCEP | HCEP (The protocol used by the NAP agent to request health certificates from the Health Registration Authority (HRA) and to prove the health of a client computer) |
protokol HDLC | High-level Data Link Control A protocol for information transfer adopted by the ISO. HDLC is a bit-oriented, synchronous protocol that applies to the data-link (message-packaging) layer (layer 2 of the ISO/OSI reference model) for computer-to-microcomputer communications (High-level Data Link Control) |
protokol HDLC | HDLC (A protocol for information transfer adopted by the ISO. HDLC is a bit-oriented, synchronous protocol that applies to the data-link (message-packaging) layer (layer 2 of the ISO/OSI reference model) for computer-to-microcomputer communications) |
protokol historie | History Log (The section in an Account, Business Contact, or Opportunity record that contains all items (such as phone logs, business notes, and e-mail messages) that are linked to the record) |
protokol HTTP | Hypertext Transfer Protocol The Internet protocol used to deliver information over the World Wide Web (Hypertext Transfer Protocol) |
protokol ICMP | Internet Control Message Protocol A required maintenance protocol in the TCP/IP suite that reports errors and allows simple connectivity. ICMP is used by the Ping tool to perform TCP/IP troubleshooting (Internet Control Message Protocol) |
protokol ICMP | ICMP (A required maintenance protocol in the TCP/IP suite that reports errors and allows simple connectivity. ICMP is used by the Ping tool to perform TCP/IP troubleshooting) |
protokol IGMP | Internet Group Management Protocol (A protocol used by Internet Protocol version 4 (IPv4) hosts to report their multicast group memberships to any immediately neighboring multicast routers) |
protokol IGMP | IGMP (A protocol used by Internet Protocol version 4 (IPv4) hosts to report their multicast group memberships to any immediately neighboring multicast routers) |
protokol IMAP | Internet Message Access Protocol A method computers use to send and receive e-mail messages. It allows you to access e-mail without downloading it to your computer (Internet Message Access Protocol) |
protokol IMAP4 | Internet Message Access Protocol 4 A standard client/server protocol for receiving e-mail. The user (or the user's e-mail client) can view just the heading and the sender of the letter and then decide whether to download the mail (Internet Message Access Protocol 4) |
protokol IMAP4 | IMAP4 (A standard client/server protocol for receiving e-mail. The user (or the user's e-mail client) can view just the heading and the sender of the letter and then decide whether to download the mail) |
protokol IMAP | IMAP (A method computers use to send and receive e-mail messages. It allows you to access e-mail without downloading it to your computer) |
protokol indexování | gatherer log (A log that is updated each time Microsoft Office SharePoint Portal Server updates a content index. Log entries contain data about URLs accessed while creating an index) |
protokol Internet Storage Name Service | iSNS (A lightweight protocol designed to make the automated discovery, management, and configuration of iSCSI and Fiber Channel Protocol (FCP) devices on a TCP/IP network easier by providing a common mechanism for initiators and targets to discover one another and for handling zoning and authentication of both targets and initiators) |
protokol IP | IP (A routable protocol in the TCP/IP protocol suite that is responsible for IP addressing, routing, and the fragmentation and reassembly of IP packets) |
protokol IP | Internet Protocol A routable protocol in the TCP/IP protocol suite that is responsible for IP addressing, routing, and the fragmentation and reassembly of IP packets (Internet Protocol) |
protokol IPSec | Internet Protocol security A set of industry-standard, cryptography-based services and protocols that help to protect data over a network (Internet Protocol security) |
protokol IPsec | IPsec (A set of industry-standard, cryptography-based services and protocols that help to protect data over a network) |
protokol IPv6 | IPv6 (A revised version of the Internet Protocol (IP) designed primarily to address growth on the Internet. IPng is compatible with, but an evolutionary successor to, the current version of IP, IPv4 (IP version 4), and was approved as a draft standard in 1998 by the IETF (Internet Engineering Task Force). It offers several improvements over IPv4 including a quadrupled IP address size (from 32 bits to 128 bits), expanded routing capabilities, simplified header formats, improved support for options, and support for quality of service, authentication, and privacy) |
protokol IPv6 | Internet Protocol version 6 A revised version of the Internet Protocol (IP) designed primarily to address growth on the Internet. IPng is compatible with, but an evolutionary successor to, the current version of IP, IPv4 (IP version 4), and was approved as a draft standard in 1998 by the IETF (Internet Engineering Task Force). It offers several improvements over IPv4 including a quadrupled IP address size (from 32 bits to 128 bits), expanded routing capabilities, simplified header formats, improved support for options, and support for quality of service, authentication, and privacy (Internet Protocol version 6) |
protokol IPv4 | Internet Protocol version 4 An Internet Protocol that has 32-bit source and destination addresses. IPv4 is the predecessor of IPv6 (Internet Protocol) |
protokol IPv4 | IPv4 (An Internet Protocol that has 32-bit source and destination addresses. IPv4 is the predecessor of IPv6) |
protokol IPX | IPX (A network protocol native to NetWare that controls addressing and routing of packets within and between LANs. IPX does not guarantee that a message will be complete (no lost packets)) |
protokol IPX | Internetwork Packet Exchange (A network protocol native to NetWare that controls addressing and routing of packets within and between LANs. IPX does not guarantee that a message will be complete (no lost packets)) |
protokol iSNS | Internet Storage Name Service (A lightweight protocol designed to make the automated discovery, management, and configuration of iSCSI and Fiber Channel Protocol (FCP) devices on a TCP/IP network easier by providing a common mechanism for initiators and targets to discover one another and for handling zoning and authentication of both targets and initiators) |
protokol Kerberos | Kerberos (An authentication protocol that provides a mechanism for mutual authentication between a client and a server, or between one server and another, before a network connection is opened between them) |
protokol kvora | quorum log (The log where the quorum resource stores data. This data is maintained by the clustering software) |
protokol L2CAP | logical link control and adaptation protocol A protocol used in personal wireless network applications that provides connection-oriented and connectionless data services to upper layer protocols with protocol multiplexing capability, segmentation and reassembly operation, and group abstractions (Logical Link Control and Adaptation Protocol) |
protokol L2CAP | L2CAP (A protocol used in personal wireless network applications that provides connection-oriented and connectionless data services to upper layer protocols with protocol multiplexing capability, segmentation and reassembly operation, and group abstractions) |
protokol LCP | Link Control Protocol A PPP control protocol that negotiates link and PPP parameters to dynamically configure the data-link layer of a PPP connection (Link Control Protocol) |
protokol LCP | LCP (A PPP control protocol that negotiates link and PPP parameters to dynamically configure the data-link layer of a PPP connection) |
protokol LDAP | Lightweight Directory Access Protocol The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3 (Lightweight Directory Access Protocol) |
protokol LDAP | LDAP (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3) |
protokol MADCAP | Multicast Address Dynamic Client Allocation Protocol An extension to the DHCP protocol standard used to support dynamic assignment and configuration of IP multicast addresses on TCP/IP-based networks (Multicast Address Dynamic Client Allocation Protocol) |
protokol MADCAP | MADCAP (An extension to the DHCP protocol standard used to support dynamic assignment and configuration of IP multicast addresses on TCP/IP-based networks) |
protokol MLS | Message Layer Security A cryptographic protocol that provides domain-to-domain secure transmission of SMTP messages on the Internet by using cryptography. The protocol enables SMTP servers to communicate directly or by using an SMTP relay over the Internet in a manner designed to prevent eavesdropping, tampering, and message forgery (Message Layer Security) |
protokol NCB | network control block (NetBIOS data structures that contain information about the command to perform an optional post routine, an optional event handle, and a pointer to a buffer that is used for messages or other data) |
protokol NCB | NCB (NetBIOS data structures that contain information about the command to perform an optional post routine, an optional event handle, and a pointer to a buffer that is used for messages or other data) |
protokol NetBEUI | NetBIOS Extended User Interface (A network protocol native to Microsoft Networking. It is usually used in small, department-size local area networks (LANs) of 1 to 200 clients. NetBEUI can use Token Ring source routing as its only method of routing. NetBEUI is the Microsoft implementation of the NetBIOS standard) |
protokol NetBEUI | NetBEUI (A network protocol native to Microsoft Networking. It is usually used in small, department-size local area networks (LANs) of 1 to 200 clients. NetBEUI can use Token Ring source routing as its only method of routing. NetBEUI is the Microsoft implementation of the NetBIOS standard) |
protokol NNTP | NNTP (A member of the TCP/IP suite of protocols used to distribute network news messages to NNTP servers and clients (newsreaders) on the Internet. NNTP is designed so that news articles are stored on a server in a central database, thus enabling a user to select specific items to read) |
protokol NNTP | Network News Transfer Protocol A member of the TCP/IP suite of protocols used to distribute network news messages to NNTP servers and clients (newsreaders) on the Internet. NNTP is designed so that news articles are stored on a server in a central database, thus enabling a user to select specific items to read (Network News Transfer Protocol) |
protokol NTLM | NTLM (A protocol using a challenge-response mechanism for authentication in which clients are able to verify their identities without sending a password to the server. It consists of three messages, commonly referred to as Type 1 (negotiation), Type 2 (challenge) and Type 3 (authentication)) |
protokol NWLink | NWLink (The Microsoft implementation of the Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) protocol used on NetWare networks. NWLink allows connectivity between Windows-based computers and NetWare networks running IPX/SPX. NWLink also provides network basic input/output system (NetBIOS) functionality and the Routing Information Protocol (RIP)) |
protokol o sestavení | build log (The recorded text output of a Visual Studio build, often indicating command lines issued and status of each step in the build process. For a C++ build, this file is called BuildLog.htm) |
protokol obnovení | recovery log (The log where the quorum resource stores data. This data is maintained by the clustering software) |
protokol OCSP | Online Certificate Status Protocol (A protocol that allows real-time validation of a certificate's status by having the CryptoAPI make a call to an OCSP responder and the OCSP responder providing an immediate validation of the revocation status for the presented certificate. Typically, an OCSP responder responds with the revocation status check request based on the certificate revocation list (CRL) or other forms of revocation status it retrieves from the certification authorities) |
protokol OSPF | OSPF (A routing protocol for Internet Protocol (IP) networks. OSPF allows a router to calculate the shortest path to each node for sending messages. The router sends information on the nodes it is linked to, called link-state advertisements, to other routers on the network to accumulate link-state information to make its calculations) |
protokol OSPF | open shortest path first A routing protocol for Internet Protocol (IP) networks. OSPF allows a router to calculate the shortest path to each node for sending messages. The router sends information on the nodes it is linked to, called link-state advertisements, to other routers on the network to accumulate link-state information to make its calculations (Open Shortest Path First) |
protokol PCT | Private Communication Technology A proposed protocol standard that supports authentication and encryption to secure privacy in Internet communications. PCT is similar to the Secure Sockets Layer (SSL) protocol (Private Communication Technology) |
protokol PCT | PCT (A proposed protocol standard that supports authentication and encryption to secure privacy in Internet communications. PCT is similar to the Secure Sockets Layer (SSL) protocol) |
protokol PNRP | PNRP (A standard set of formats and procedures which enables secure and dynamic publication, registration and resolution of computer names and IP addresses including the ability to register multiple names on a single computer, multiple computers to a single name, and have names registered by applications) |
protokol PNRP | Peer Name Resolution Protocol A standard set of formats and procedures which enables secure and dynamic publication, registration and resolution of computer names and IP addresses including the ability to register multiple names on a single computer, multiple computers to a single name, and have names registered by applications (Peer Name Resolution Protocol) |
protokol POP3 | Post Office Protocol version 3 An Internet standard protocol that allows a user to download e-mail from his or her inbox on a server to the client computer where messages are managed. This protocol works well for computers that are unable to maintain a continuous connection to a server (Post Office Protocol version 3) |
protokol POP3 | POP3 (An Internet standard protocol that allows a user to download e-mail from his or her inbox on a server to the client computer where messages are managed. This protocol works well for computers that are unable to maintain a continuous connection to a server) |
protokol PPP | PPP (A set of industry-standard framing and authentication protocols that are included with Windows to ensure interoperability with other remote access software. PPP negotiates configuration parameters for multiple layers of the Open Systems Interconnection (OSI) model. The Internet standard for serial communications, PPP defines how data packets are exchanged with other Internet-based systems using a modem connection. PPP is documented in RFC 1661) |
protokol PPP | Point-to-Point Protocol A set of industry-standard framing and authentication protocols that are included with Windows to ensure interoperability with other remote access software. PPP negotiates configuration parameters for multiple layers of the Open Systems Interconnection (OSI) model. The Internet standard for serial communications, PPP defines how data packets are exchanged with other Internet-based systems using a modem connection. PPP is documented in RFC 1661 (Point-to-Point Protocol) |
protokol PPPoE | PPPoE (A specification for connecting users on an Ethernet network to the Internet through a broadband connection, such as a single DSL line, wireless device, or cable modem. Using PPPoE and a broadband modem, LAN users can gain individual authenticated access to high-speed data networks. By combining Ethernet and Point-to-Point Protocol (PPP), PPPoE provides an efficient way to create a separate connection for each user to a remote server) |
protokol PPPoE | Point-to-Point Protocol over Ethernet A specification for connecting users on an Ethernet network to the Internet through a broadband connection, such as a single DSL line, wireless device, or cable modem. Using PPPoE and a broadband modem, LAN users can gain individual authenticated access to high-speed data networks. By combining Ethernet and Point-to-Point Protocol (PPP), PPPoE provides an efficient way to create a separate connection for each user to a remote server (Point-to-Point Protocol over Ethernet) |
protokol PPTP | PPTP (Networking technology that supports multiprotocol virtual private networks (VPNs), enabling remote users to access corporate networks securely across the Internet or other networks by dialing into an Internet service provider (ISP) or by connecting directly to the Internet. PPTP tunnels, or encapsulates, Internet Protocol (IP) or Internetwork Packet Exchange (IPX) traffic inside IP packets. This means that users can remotely run applications that depend on particular network protocols. PPTP is described in RFC 2637) |
protokol PPTP | Point-to-Point Tunneling Protocol Networking technology that supports multiprotocol virtual private networks (VPNs), enabling remote users to access corporate networks securely across the Internet or other networks by dialing into an Internet service provider (ISP) or by connecting directly to the Internet. PPTP tunnels, or encapsulates, Internet Protocol (IP) or Internetwork Packet Exchange (IPX) traffic inside IP packets. This means that users can remotely run applications that depend on particular network protocols. PPTP is described in RFC 2637 (Point-to-Point Tunneling Protocol) |
protokol pracovní položky | work item log (A log that lists the current notes you are typing and the uneditable historical conversation that has already been saved) |
protokol PXE | PXE protocol (An extension to the DHCP protocol that enables information to be sent to network-bootable systems and enables these systems to find RIS servers) |
protokol přenosu | transfer log (A log, located on the DPM server, that stores pending changes to a replica) |
protokol připojení klientů k externím systémům | tenant-level external data log (An error log that contains errors and exceptions that occur when SharePoint tries to connect to external systems through Business Connectivity Services. It can be retrieved by tenant administrators) |
protokol RADIUS | Remote Authentication Dial-In User Service A proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to link (Remote Authentication Dial-In User Service) |
protokol RADIUS | RADIUS (A proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to link) |
protokol RDP | Remote Desktop Protocol A proprietary protocol to provide remote display and input capabilities over network connections for Windows®-based applications between two computers (Remote Desktop Protocol) |
protokol RDP | RDP (A proprietary protocol to provide remote display and input capabilities over network connections for Windows®-based applications between two computers) |
protokol RFC | RFC (A SAP protocol that enables external systems to call SAP ABAP function modules. RFCs enable remote calls between two SAP systems or between a SAP system and a non-SAP system) |
protokol RFC | Remote Function Call A SAP protocol that enables external systems to call SAP ABAP function modules. RFCs enable remote calls between two SAP systems or between a SAP system and a non-SAP system (Remote Function Call) |
protokol RPC | RPC (A communication mechanism that allows computers to communicate with one another over a network. An RPC consists of a procedure identifier, parameters passed to the procedure, and a value returned to the caller (client computer) after the procedure has executed on the remote system (server computer)) |
protokol RTSP | RTSP (A network protocol, defined in RFC 2326, for controlling one or more digital media streams or a presentation (the aggregate of related media streams)) |
protokol RTSP | Real-Time Streaming Protocol A network protocol, defined in RFC 2326, for controlling one or more digital media streams or a presentation (the aggregate of related media streams) (Real Time Streaming Protocol) |
protokol server-to-server | server-to-server protocol (An authentication protocol between two servers or services) |
protokol S-HTTP | Secure Hypertext Transfer Protocol A protocol that provides a secure Hypertext Transfer Protocol (HTTP) connection (Secure Hypertext Transfer Protocol) |
protokol S-HTTP | S-HTTP (A protocol that provides a secure Hypertext Transfer Protocol (HTTP) connection) |
protokol SIP | SIP (A standard signaling protocol for establishing multi-media communications sessions between two or more users over an IP network) |
protokol SIP | Session Initiation Protocol A standard signaling protocol for establishing multi-media communications sessions between two or more users over an IP network (Session Initiation Protocol) |
protokol SMB | SMB (A file-sharing protocol designed to allow networked computers to transparently access files that reside on remote systems over a variety of networks. The SMB protocol defines a series of commands that pass information between computers. SMB uses four message types: session control, file, printer, and message) |
protokol SMB | Server Message Block A file-sharing protocol designed to allow networked computers to transparently access files that reside on remote systems over a variety of networks. The SMB protocol defines a series of commands that pass information between computers. SMB uses four message types: session control, file, printer, and message (Server Message Block) |
protokol SMTP | Simple Mail Transfer Protocol A member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents (Simple Mail Transfer Protocol) |
protokol SMTP | SMTP (A member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents) |
protokol SNMP | SNMP (A network protocol used to manage TCP/IP networks. In Windows, the Simple Network Management Protocol (SNMP) service is used to provide status information about a host on a TCP/IP network) |
protokol SNMP | Simple Network Management Protocol A network protocol used to manage TCP/IP networks. In Windows, the Simple Network Management Protocol (SNMP) service is used to provide status information about a host on a TCP/IP network (Simple Network Management Protocol) |
protokol S2S | S2S protocol (An authentication protocol between two servers or services) |
protokol TCP | Transmission Control Protocol The protocol within TCP/IP that governs the breakup of data messages into packets to be sent via IP, and the reassembly and verification of the complete messages from packets received by IP (Transmission Control Protocol) |
protokol TCP | TCP (The protocol within TCP/IP that governs the breakup of data messages into packets to be sent via IP, and the reassembly and verification of the complete messages from packets received by IP) |
protokol TCP/IP | Transmission Control Protocol/Internet Protocol A set of networking protocols widely used on the Internet that provides communications across interconnected networks of computers with diverse hardware architectures and various operating systems. TCP/IP includes standards for how computers communicate and conventions for connecting networks and routing traffic (Transmission Control Protocol/Internet Protocol) |
protokol TCP/IP | TCP/IP (A set of networking protocols widely used on the Internet that provides communications across interconnected networks of computers with diverse hardware architectures and various operating systems. TCP/IP includes standards for how computers communicate and conventions for connecting networks and routing traffic) |
Protokol telemetrie Office | Office Telemetry Log (A feature that displays an Office event log in Excel format and helps the user to find and resolve known compatibility issues for Office files and solutions) |
protokol Telnet | Telnet (A protocol that enables an Internet user to log on to and enter commands on a remote computer linked to the Internet, as if the user were using a text-based terminal directly attached to that computer. Telnet is part of the TCP/IP suite of protocols) |
protokol TLS | Transport Layer Security A protocol that provides communications privacy and security between two applications communicating over a network. TLS encrypts communications and enables clients to authenticate servers and, optionally, servers to authenticate clients. TLS is a more secure version of the Secure Sockets Layer (SSL) protocol (Transport Layer Security) |
protokol TLS | TLS (A protocol that provides communications privacy and security between two applications communicating over a network. TLS encrypts communications and enables clients to authenticate servers and, optionally, servers to authenticate clients. TLS is a more secure version of the Secure Sockets Layer (SSL) protocol) |
protokol trasování | trace log (The file that contains the information gathered during trace logging) |
protokol UDP | User Datagram Protocol A connectionless transport protocol in the TCP/IP protocol stack that is used in cases where some packet loss is acceptable, for example, with digital media streams (User Datagram Protocol) |
protokol UDP | UDP (A connectionless transport protocol in the TCP/IP protocol stack that is used in cases where some packet loss is acceptable, for example, with digital media streams) |
protokol událostí | event log (A record of activities on a computer system. Events can include attempts to establish communication, successful establishment of sessions, failures of system components, attempts to use files that are damaged or missing, configuration problems, and responses from remote systems) |
protokol WAP | Wireless Application Protocol A standard protocol for providing Internet communications and advanced telephony services on phones, pagers, PDAs, and other wireless terminals (Wireless Application Protocol) |
protokol WAP | WAP (A standard protocol for providing Internet communications and advanced telephony services on phones, pagers, PDAs, and other wireless terminals) |
protokol WebDAV | WebDAV (A set of extensions to the Hypertext Transfer Protocol (HTTP) that facilitates collaborative editing and file management between users located remotely from each other on the Internet) |
protokol WebDAV | Web Distributed Authoring and Versioning A set of extensions to the Hypertext Transfer Protocol (HTTP) that facilitates collaborative editing and file management between users located remotely from each other on the Internet (Web Distributed Authoring and Versioning) |
protokol WebSocket | WebSocket protocol (A feature of Internet Information Services (IIS) that lets the server establish a long-running, full-duplex, bidirectional TCP connection to the client and that lets the server push data to the client) |
protokol WEP | Wired Equivalent Privacy An encryption algorithm system included as part of the 802.11 standard, developed by the Institute of Electrical and Electronics Engineers as a security measure to protect wireless LANs from casual eavesdropping. WEP uses a shared secret key to encrypt packets before transmission between wireless LAN devices and monitors packets in transit to detect attempts at modification. WEP offers both 40-bit and 128-bit hardware-based encryption options (Wired Equivalent Privacy) |
protokol WPAD | WPAD (A standard networking protocol used to help Internet client software automatically locate and interface with cache services within a network) |
protokol WPAD | Web Proxy AutoDiscovery A standard networking protocol used to help Internet client software automatically locate and interface with cache services within a network (Web Proxy AutoDiscovery) |
protokol WS-F PRP | WS-Federation Passive Requestor Profile An implementation of the WS-Federation specification that proposes a standard protocol for how passive clients (such as Web browsers) apply the federation framework. Within this protocol, Web service requestors are expected to understand the new security mechanisms and be capable of interacting with Web service providers (WS-Federation Passive Requestor Profile) |
protokol WS-F PRP | WS-F PRP (An implementation of the WS-Federation specification that proposes a standard protocol for how passive clients (such as Web browsers) apply the federation framework. Within this protocol, Web service requestors are expected to understand the new security mechanisms and be capable of interacting with Web service providers) |
protokol 802.1X | 802.1X (An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks) |
protokol zabezpečení | security protocol (A specification that defines security-related data objects and rules about how the objects are used to maintain security on a computer system) |
protokol změn | change log (The log where the quorum resource stores data. This data is maintained by the clustering software) |
protokoly volání | call logs (A list of incoming calls and outgoing calls, showing information such as the name of the caller or call recipient, the date and the time of the call) |
přenos protokolu RPC | RPC transport (The underlying network services used by the remote procedure call (RPC) runtime for communications between network nodes) |
přesouvání protokolu | log shipping (Copying, at regular intervals, log backup from a read-write database (the primary database) to one or more remote server instances (secondary servers). Each secondary server has a read-only database, called a secondary database, that was created by restoring a full backup of the primary database without recovery. The secondary server restores each copied log backup to the secondary database. The secondary servers are warm standbys for the primary server) |
sada protokolů AppleTalk | AppleTalk Protocol suite (The set of network protocols on which AppleTalk network architecture is based. The AppleTalk Protocol is installed with Services for Macintosh to help users access resources on a network) |
služba Protokol událostí | Event Log service (A service that records events in the system, security, and application logs) |
soubor protokolu | log file (A file that stores messages generated by an application, service, or operating system. These messages are used to track the operations performed. Log files are usually plain text (ASCII) files and often have a .log extension) |
soubor transakčního protokolu | transaction log file (A file that contains a record of the changes that were made to an Exchange database. All changes to the database are recorded in the transaction log files before they are written into the database files. If a database shuts down unexpectedly, unfinished transactions can be restored by replaying the transaction log files into the database) |
Standardní protokol IEEE pro ověřování připojení přechodných zařízení úložiště k hostitelským systémům | IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices (The IEEE industry standard that defines methods for authenticating transient removable storage devices (e.g. USB flash drives, memory cards, and portable hard disks) when they are mounted to host computers in corporate, government, academic, and other environments) |
systémový protokol | system log (A record of events that are generated by the operating system components) |
síťový protokol | network protocol (A set of rules and parameters that defines and enables communication through a network) |
transakční protokol | transaction log (A file that records transactional changes occurring in a database, providing a basis for updating a master file and establishing an audit trail) |
transportní protokol NWLink kompatibilní s protokoly IPX/SPX/NetBIOS | NWLink IPX/SPX/NetBIOS Compatible Transport Protocol (The Microsoft implementation of the Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) protocol used on NetWare networks. NWLink allows connectivity between Windows-based computers and NetWare networks running IPX/SPX. NWLink also provides network basic input/output system (NetBIOS) functionality and the Routing Information Protocol (RIP)) |
Trojský protokol Telnet | Trojan telnet (A type of Trojan malware that installs a telnet server on a user's computer without the user's knowledge) |
Typ protokolu EAP | EAP type (A feature that allows the user to select the type of Extensible Authentication Protocol used) |
tělo protokolu SOAP | SOAP body (A collection of zero or more elements in a SOAP message) |
virtuální soubor protokolu | virtual log file (Non-physical files that are derived from one physical log file by the SQL Server Database Engine) |
vytvoření partnerského vztahu protokolu BGP | BGP peering (The process of route exchange between peers via the Border Gateway Protocol) |
všesměrové vysílání pomocí protokolu IP | Internet Protocol multicasting (The extension of local area network multicasting technology to a TCP/IP network. Hosts send and receive multicast datagrams, the destination fields of which specify IP host group addresses rather than individual IP addresses. A host indicates that it is a member of a group by means of the Internet Group Management Protocol (IGMP)) |
zprostředkovatel protokolu | log provider (A provider that logs package information at run time. Integration Services includes a variety of log providers that make it possible to capture events during package execution. Logs are created and stored in formats such as XML, text, database, or in the Windows event log) |
záloha protokolu poškozené databáze | tail-log backup (A log backup taken from a possibly damaged database to capture the log that has not yet been backed up. A tail-log backup is taken after a failure in order to prevent work loss) |
záloha protokolů | log backup (A backup of transaction logs that includes all log records not backed up in previous log backups. Log backups are required under the full and bulk-logged recovery models and are unavailable under the simple recovery model) |
záloha transakčních protokolů | transaction log backup (A backup of transaction logs that includes all log records not backed up in previous log backups. Log backups are required under the full and bulk-logged recovery models and are unavailable under the simple recovery model) |
zálohování protokolu poškozené databáze | tail-log backup (A log backup taken from a possibly damaged database to capture the log that has not yet been backed up. A tail-log backup is taken after a failure in order to prevent work loss) |
zálohování protokolů | log backup (A backup of transaction logs that includes all log records not backed up in previous log backups. Log backups are required under the full and bulk-logged recovery models and are unavailable under the simple recovery model) |
zálohování transakčních protokolů | transaction log backup (A backup of transaction logs that includes all log records not backed up in previous log backups. Log backups are required under the full and bulk-logged recovery models and are unavailable under the simple recovery model) |
úloha přesunutí protokolu | log shipping job (A job performing one of the following log-shipping operations: backing up the transaction log of the primary database at the primary server (the backup job), copying the transaction log file to a secondary server (the copy job), or restoring the log backup to the secondary database on a secondary server (the restore job). The backup job resides on the primary server; the copy and restore jobs reside on each of the secondary servers. See also: primary database, primary server, secondary database, secondary server) |
účet podporující protokol POP | POP-enabled account (An account that can receive mail using the POP3 protocol) |
čistá záloha protokolu | pure log backup (A backup containing only the transaction log covering an interval without any bulk changes) |
čisté zálohování protokolu | pure log backup (A backup containing only the transaction log covering an interval without any bulk changes) |
řetěz protokolů | log chain (A continuous sequence of transaction logs for a database. A new log chain begins with the first backup taken after the database is created, or when the database is switched from the simple to the full or bulk-logged recovery model. A log chain forks after a restore followed by a recovery, creating a new recovery branch) |