Slovak | English |
chránený prístup Wi-Fi 2 | Wi-Fi Protected Access 2 (A wireless implementation and the second generation of WPA security that is based on the final IEEE 802.11i amendment to the 802.11 standard) |
hlavička P2 | P2 header (A hidden section of an e-mail message. From the time a message is first created, information about it is added to the message header, including technical details, such as who created the message and the software used to compose it) |
protokol L2CAP | logical link control and adaptation protocol (A protocol used in personal wireless network applications that provides connection-oriented and connectionless data services to upper layer protocols with protocol multiplexing capability, segmentation and reassembly operation, and group abstractions) |
protokol L2TP | Layer Two Tunneling Protocol (An industry-standard Internet tunneling protocol that provides encapsulation for sending Point-to-Point Protocol (PPP) frames across packet-oriented media. For IP networks, L2TP traffic is sent as User Datagram Protocol (UDP) messages. In Microsoft operating systems, L2TP is used in conjunction with Internet Protocol security (IPSec) as a virtual private network (VPN) technology to provide remote access or router-to-router VPN connections. L2TP is described in RFC 2661) |
protokol S2S | S2S protocol (An authentication protocol between two servers or services) |
protokol S2S | server-to-server protocol (An authentication protocol between two servers or services) |
rozhranie CAPI2 | CAPI2 (The API that supports PKI and X.509 certificates, such as certificate chain validation, certificate stores, and signature verification) |
rozhranie CryptoAPI 2.0 | CryptoAPI 2.0 (The API that supports PKI and X.509 certificates, such as certificate chain validation, certificate stores, and signature verification) |