Novell Netware 4.X Security Previous Screen Jeffrey L

Total Page:16

File Type:pdf, Size:1020Kb

Novell Netware 4.X Security Previous Screen Jeffrey L 84-10-20 Novell NetWare 4.X Security Previous screen Jeffrey L. Ott Payoff Novell's NetWare 4.X offers improved security features over previous NetWare releases. To capitalize on the strengths of 4.X, system and information security administrators must relearn how to manage the NetWare environment and the security of the information assets across the local area network. This article discusses the differences between NetWare 3.X and NetWare 4.X security and identifies the tools that security administrators will have at their disposal for securing the NetWare 4.X environment. Introduction The mid-1980s hosted a surge in the use of computer hardware and software in businesses worldwide. In many organizations, PCs were purchased for isolated departments without the guidance of corporate information systems departments. Soon, these isolated departments began to connect their PC workstations and common area printers together by using low-cost Network Operating System. Leading the network operating systems war was Novell's NetWare, which proved over time to be both efficient and cost effective. As departmental local area networks (LANs) grew, so did the need to incorporate these departmental LANs into other LANs within the organization. Although NetWare 3.X had become synonymous with the LAN network operating systems, it fell short of meeting the business requirements of the newly emerging client/server environment. From a system management perspective, NetWare 3.X lacked the ability to manage multiple servers from a single location. In response to this need, Novell released NetWare 4.X. This article discusses the differences between NetWare 3.X and NetWare 4.X security, and identifies the enhanced tools that security administrators will have at their disposal for securing the NetWare 4.X environment. The article also presents particularly sensitive areas of security concern for NetWare 4.X security administrators. Understanding Netware Security Basics The three fundamental components of information security are availability, confidentiality, and integrity. · Availability. The information system (i.e., the LAN, mainframe, mini, or attached network) must be available whenever it is needed. · Confidentiality. The information system and the data on the system must be available only to those who are authorized to use it. This requires the authentication of users who attempt to access the system and other measures, as needed, to limit users' access to only the information that they require for job-related duties. · Integrity. The information system and the data on that system must remain free from unauthorized, intentional (i.e., malicious and preplanned)and unintentional (i.e., accidental) modifications. These threats may come from within the organization or from outside the organization. Any information security program, application, and implementation must address these three fundamental components. Network Security Exposures and Risks Previous screen Many threats to information systems attack the hardware, software, and information on a system. Network hardware includes all of the physical pieces of the LAN, including the server, cables, wiring, telecom devices, routers, bridges, printers, and peripherals. Network software includes all of the applications, operating systems, and other programs executing on the network. Network information includes all of the information that resides on the LAN, such as application data, configuration parameters, and transmissions. Threats to a LAN include any intentional or unintentional destruction, modification, or disclosure of information. These threats range from the actions of hackers to industrial espionage and natural disasters. The most common disruptions of service occur as a result of mistakes made by employees. Security administrators should begin an analysis of the threats to the software and the information on the LAN by evaluating the physical security of the server. The server should be in a locked room, which will protect the equipment (e.g., the servers, tape backup devices, and media) from theft and from malicious use of the console. The console is the command center of a NetWare LAN; it is from the console that NetWare Loadable Modules (NLMs)are loaded. Anyone with access to the console has the ability to place NLMs on the system--many of which are malicious in nature, such as BURGLAR.NLM and SUPERPWD.NLM. The server should be connected to an uninterruptable power supply (UPS). An UPS will provide a window of time in which the system administrator can power down the server during an extended power outage. The UPS also cleans and filters electricity before it reaches the server, thus eliminating power surges, spikes, and brownouts. Netware Directory Services NetWare 4.X marks a radical change in NetWare security. The single most important change to NetWare is the introduction of NetWare Directory Services(NDS). NDS replaces the server-based Bindery of NetWare 3.X with a global, hierarchical, loosely consistent and replicated data base of all of the network resources and their associated properties. NDS enables NetWare 4.X to be an enterprisewide Network Operating System, because it allows NDS system administrators to create one flexible hierarchical directory for an entire network, and for an almost unlimited number of network resources. Implementation, administration, and management of NDS should be the first priority of the security administrator handling NetWare 4.X security. Exhibit 1 presents the security-related differences between NetWare 3.X and NetWare 4.X. Comparison of NetWare 3.X and 4.X Security Features Feature NetWare 3.X NetWare 4.X -------- ----------- ----------- Previous screen Maximum number of users connections per server 250 1,000 Object based naming service No Yes Single login to network No Yes RSA public/private key encryption No Yes Restrict login to specific Macintosh address No Yes NDS event auditing N/A Yes File system auditing No Yes Independent network auditor No Yes Independent network auditor password No Yes Audit user security transactions No Yes Audit supervisor transactions No Yes Audit file-creation statistics No Yes Audit directory creation statistics No Yes Audit volume statistics No Yes Filter transaction logs No Yes Transaction monitoring and auto log updates No Yes Multiple auditors No Yes Remote console session security No Yes Remote console modem callback No Yes Network supervisor Yes Yes Workgroup manager Yes Yes User account manager Yes Yes File server console operator Yes Yes Determine who has console and supervisor privileges No Yes Audit trail name service events No Yes Governmental C-2 level security certification No Yes An NDS directory is typically illustrated as an upside-down tree, with the roots at the top and the branches and leaves at the bottom. This representation of the NDS architecture should help security administrators to conceptualize the layout of a NetWare 4.X network. Exhibit 2 presents a basic NDS directory tree structure. Security rights in the Previous screen NDS structure flow down: if a user has access at a higher level in the NDS directory tree, the user will generally have access to branches and leaves beneath the permitted level. NDS Directory Tree NetWare Directory Services Objects The NDS data base is comprised of objects. NDS objects are not physical objects; they are object representations and the object's associated properties. This allows the physical object (e.g., the user, server, or device) to be physically removed from the server where the NDS resides. This treatment differs from the Bindery treatment of network objects in previous releases of NetWare, in which the Bindery was aware of only those objects that were directly attached to its server. The NDS structure facilitates the management of an enterprisewide network. For example, the administrator does not need to know the address or location of a printer to permit a group of users access to that printer, nor must the administrator create new logon IDs for these users for the printer s server. Instead, the administrator provides access to the requested printer to the group, even if the printer is a continent away. Each NDS object has a set of properties, and each object property has associated property values. For example, the user object's associated properties include name, other name, description, location, and telephone number. The data entered for each of those properties are the property values. There are three basic types of objects in an NDS directory: · Physical objects (e.g., users, servers, and printers). · Logical objects (e.g., user groups, queues, and partitions) · Other objects (managerial objects that help organize the other objects in the NDS directory tree, such as Organization and Organizational Unit objects.) There are also three different classifications of objects: · Root object. · Container object. · Leaf object. Root Object. When NetWare is installed, the root is placed at the top of the directory tree. The root cannot be renamed or removed, and is always designated with brackets (i.e., [Root]). Container Objects. When NetWare 4.X is installed, one container object is created. Container objects form the next part of the directory tree after the root. A container holds other objects, which must be other container objects or leaf objects. The container object provides a means to organize a directory logically. Within container objects are two further classifications: · Organization. This organization (O) classification
Recommended publications
  • SUCCESS STORY. Security Software Porting from Netware to Novell Linux
    SUCCESS STORY. >_ >_ Security Software Porting From Netware To Novell >_ Linux About the The Client is a leader in the development of real-time monitoring, auditing and computer forensics Client technologies for Windows and Novell networks. Its ⧄agship product is used to secure the assets of the world’s largest corporations, banks, and government agencies, educational and healthcare institutions. Business The Client had a signi⣴cant install base for its ⧄agship software on Novell Netware OS. Novell’s Challenge adoption of Linux as the migration path for Netware OS created both an opportunity and a challenge for the Client. To continue supporting its Netware user base through Linux migration, the client wanted to port its monitoring and auditing solution to support SUSE Linux, Novell eDirectory and NSS (Novell Storage Services). The Client did not have in-house Linux Systems programming expertise, especially with ⣴le systems & security knowledge and approached Silicus. Silicus The software had two parts – the agent (client) and the server. The agent was a module that was Solution installed on the PC’s to be audited, and sends information on PC activities to a server installed at a centralized location. Termination of Netware required the agent to be re-developed/ported to Linux. Silicus commenced a feasibility study to address a few unknowns in the project: • Identify the auditing modules available on SuSE Linux • XML libraries that could be used • Multi-threading architecture to be used for agent development Silicus created a software architecture and design for the remote management agent. The agent was developed leveraging 3rd party tools to perform the auditing, monitoring of the Linux systems and communication with the remote server.
    [Show full text]
  • Novell Management Tools
    04 0789729849_ch03.qxd 11/10/03 12:43 PM Page 91 CHAPTER 3 Novell Management Tools Using ConsoleOne ConsoleOne is a Java-based tool for managing your network and its resources. It can be launched by running CONSOLEONE.EXE from where it was installed (default: SYS:PUBLIC\MGMT\CONSOLEONE\1.2\BIN). By default, it lets you manage Novell eDirectory objects, schema, parti- tions, and replicas and NetWare server resources. If you install other Novell products, the appropriate management capabil- ities are automatically snapped into the version of ConsoleOne installed on that server. ConsoleOne is installed during the NetWare 6.5 installation, but can also be re-installed or installed locally from the Novell client’s CD. ConsoleOne also supports remote server console access through a Java applet called RConsoleJ. To access the NetWare 6.5 server console remotely, launch ConsoleOne and browse to the desired server. Select Tools, and then Remote Console. Accessing Web Manager Web Manager is a Web-based “home page” for accessing most of the NetWare 6.5 Web-based tools and services. To access Web Manager, open your Web browser and enter your Web server’s domain name or IP address, followed by a colon and the Web Manager port, which by default is 2200. For example: 04 0789729849_ch03.qxd 11/10/03 12:43 PM Page 92 92 PART I Getting Started https://www.quills.com:2200 or https://137.65.192.1:2200 Accessing iManager iManager provides role-based management of your NetWare network, together with a nearly comprehensive set of administrative tools.
    [Show full text]
  • Novell Cluster Services,. for Linux. and Netware
    Novell Cluster Services,. for Linux. and NetWare. ROB BASTIAANSEN SANDER VAN VUGT Novell PRESS. Novell. Published by Pearson Education, Inc. 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 CHAPTER 1: Introduction to Clustering and High Availability 5 Novell Cluster Services Defined 5 Shared Disk Access 6 Secondary IP Addresses 7 Clustering Terminology 8 High-Availability Solutions Overview 12 Novell Cluster Services 12 Business Continuity Clustering 13 PolyServe Matrix Server 15 Heartbeat Subsystem for High-Availability Linux 16 When Not to Cluster Applications 16 Availability Defined 18 High Availability Defined 18 Calculating Average Downtime 21 Avoiding Downtime 22 Hardware 22 Environment 23 Software 23 Procedures 24 Novell Cluster Services Requirements 24 Hardware Requirements 24 Software Requirements 26 CHAPTER 2: Examining Novell Cluster Services Architecture 27 Novell Cluster Services Objects and Modules 27 Cluster eDirectory Objects 28 Cluster Modules 31 IH Novell Cluster Services for Linux and NetWare Heartbeats, Epoch Numbers, and the Split Brain Detector 35 Removing a Failing Slave Node 36 Removing a Failed Master Node 37 Summary 37 CHAPTER 3: Clustering Design 39 Cluster Design Guidelines 39 How Many Nodes to Choose 39 Using a Heartbeat LAN or Not 40 Use NIC Teaming 41 Choosing Storage Methods 42 Mirror the Split Brain Detector Partition 48 Selecting Applications to Run in a Cluster 48 eDirectory Cluster Guidelines 50 Creating a Failover Matrix 52 Application-Specific Design Guidelines
    [Show full text]
  • Migrating from Netware to OES 2 Linux
    Best Practice Guide www.novell.com Migrating from NetWare to OES 2 prepared for Novell OES 2 User Community Published: November, 2007 Disclaimer Novell, Inc. makes no representations or warranties with respect to the contents or use of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Trademarks Novell is a registered trademark of Novell, Inc. in the United States and other countries. * All third-party trademarks are property of their respective owner. Copyright 2007 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of Novell, Inc. Novell, Inc. 404 Wyman Suite 500 Waltham Massachusetts 02451 USA Prepared By Novell Services and User Community Migrating from NetWare to OES 2—Best Practice Guide November, 2007 Novell OES 2 User Community The latest version of this document, along with other OES 2 Linux Best Practice Guides, can be found with the NetWare to Linux Migration Resources at: http://www.novell.com/products/openenterpriseserver/netwaretolinux/view/all/-9/tle/all Contents Acknowledgments.................................................................................. iv Getting Started...................................................................................... 1 Why OES 2?..............................................................................................1 Which Services Are Right for OES 2? ................................................................4
    [Show full text]
  • DR DOS for the Zfx86
    DR DOS for the ZFx86 Cost Effective, Reliable, Rapid Deployment of Embedded Systems w DR DOS on the ZFx86 gets products to market quickly at the lowest development and ownership cost. w Thousands of compatible applications, drivers and utilities available free or at minimal cost. w Full documentation available. DR DOS 7.03 Key Features of DR DOS Online Manual - DRDOS is supplied with a complete The ideal embedded DOS system, online manual that contains detailed information about all designed for out-of-the-box of the features of the operating system including the basic implementation into ROM or Flash commands, and the advanced utilities. It also has online ROM with tools and associated help available for all its commands. documents available in the DRDOS Memory Management - Memory management features OEM Documentation Kit. include a set of device drivers and commands that enable w 100% MS-DOS 6.22 compatible.. you to manage memory efficiently and make as much memory as possible available to your applications. w Comprehensive DOS utility set DOS Protected Mode Services - DOS Protected Mode w Multitasking, with API for developers Services (DPMS) interface allows specially-implemented w DPMS memory manager in addition to DPMI device drivers and TSRs to operate in extended memory. w Stacker disk compression This makes more memory within the first megabyte w NWCACHE - disk caching program available to applications and other conventionally-written drivers and TSRs. Both Stacker* (the disk compression w EMM386 memory manager program), and NWCACHE (the disk cache) use DPMS. w DOS Protected Mode Services (DPMS) Disk Compression - The disk compression component w Multitasking enables you to store more information by compressing the w DR-DOS provides a full multitasking environment data.
    [Show full text]
  • Netware 6 Installation C4882-4 Ch01.F 2/4/02 9:53 AM Page 4
    c4882-4 Ch01.F 2/4/02 9:53 AM Page 3 CHAPTER 1 NetWare 6 Installation c4882-4 Ch01.F 2/4/02 9:53 AM Page 4 Instant Access ● Preparing to install There are four recommended tasks to prepare your network for NetWare 6: ᮣ Back up your data ᮣ Update eDirectory (if necessary) ᮣ Update eDirectory schema (if necessary) ᮣ Update Certificate Authority object in eDirectory Installing ᮣ To install a new server, run INSTALL from the root of the NetWare 6 Operating System CD-ROM. Upgrading ᮣ NetWare 4.x or 5.x — To upgrade to NetWare 6 choose one of these options: • Perform an Accelerated Upgrade by running ACCUPG.exe from the root of the NetWare 6 Operating System CD-ROM. This requires that you first copy the entire NetWare 6 Operating System CD-ROM to a NetWare server that will function as the Staging server. • Perform an In-Place upgrade by running INSTALL from the root of the NetWare 6 Operating System CD-ROM. • Perform a server migration by installing and running NetWare Migration Wizard from a client workstation. This utility is available on the NetWare 6 Operating System CD-ROM (\PRODUCTS\MIGRTWZD.EXE). ᮣ NetWare 3 — To upgrade to NetWare 6, perform a server migration by installing and running NetWare Migration Wizard from a client workstation. This utility is available on the NetWare 6 Operating System CD-ROM (\PRODUCTS\MIGRTWZD.EXE). ᮣ NT v3.51 or v4 — To upgrade to NetWare 6, perform a server migration by installing and running NetWare Migration Wizard from a client workstation.
    [Show full text]
  • Netware 6 Server Management CHAPTER 3
    04 9814 ch03.qxd 8/19/04 9:32 AM Page 165 CHAPTER 3 NetWare 6 Server Management CHAPTER 3 This chapter covers the following testing objectives for Novell Course 3004: Novell Network Management: . Use NetWare Remote Manager . Identify What iMonitor Is and How to Use It . Use iMonitor to Diagnose and Repair eDirectory Problems . Set Up and Configure NSS . Monitor, Manage, and Rebuild NSS Storage Space . Set Up SMS for SBCON and NWBACK32 . Back Up Data with SBCON and NWBACK32 . Restore Data with SBCON and NWBACK32 Novell is directing the construction of the world’s central information super- highway with the help of you, me, and thousands of other electronic transit workers (orange vest optional). NetWare 6 further revolutionizes Novell’s oneNet strategy with the introduction of Web-enabled administration tools, highly scalable networking protocols, and multiprocessor support. Implementing these components makes your job easier and provides your users with more reliable network access. Welcome to anytime, anywhere advanced administration via NetWare 6. As a network administrator, it’s your responsibility to focus on the NetWare 6 network to ensure that it stays fine-tuned and in peak condition. In Chapter 1, “NetWare 6 Installation,” and Chapter 2, “NetWare 6 Upgrade and Migration,” we began our NetWare 6 CNE journey by building the cor- nerstone of your network—the NetWare 6 server. Now it’s time to super- charge the network. 04 9814 ch03.qxd 8/19/04 9:32 AM Page 166 166 PART I Novell Network Management for NetWare 6 This chapter focuses on three key areas related to managing your NetWare 6 server: .
    [Show full text]
  • An Overview of the Netware Operating System
    An Overview of the NetWare Operating System Drew Major Greg Minshall Kyle Powell Novell, Inc. Abstract The NetWare operating system is designed specifically to provide service to clients over a computer network. This design has resulted in a system that differs in several respects from more general-purpose operating systems. In addition to highlighting the design decisions that have led to these differences, this paper provides an overview of the NetWare operating system, with a detailed description of its kernel and its software-based approach to fault tolerance. 1. Introduction The NetWare operating system (NetWare OS) was originally designed in 1982-83 and has had a number of major changes over the intervening ten years, including converting the system from a Motorola 68000-based system to one based on the Intel 80x86 architecture. The most recent re-write of the NetWare OS, which occurred four years ago, resulted in an “open” system, in the sense of one in which independently developed programs could run. Major enhancements have occurred over the past two years, including the addition of an X.500-like directory system for the identification, location, and authentication of users and services. The philosophy has been to start as with as simple a design as possible and try to make it simpler as we gain experience and understand the problems better. The NetWare OS provides a reasonably complete runtime environment for programs ranging from multiprotocol routers to file servers to database servers to utility programs, and so forth. Because of the design tradeoffs made in the NetWare OS and the constraints those tradeoffs impose on the structure of programs developed to run on top of it, the NetWare OS is not suited to all applications.
    [Show full text]
  • Specialized Servers in Local Area Networks
    ELEKTROTEHNIČKO DRUŠTVO ZAGREB HR - 41000 ZAGREB, Berislavićeva 6 IV MEĐUNARODNI SIMPOZIJ O NOVIM TEHNOLOGIJAMA PULA, 25. - 27. 10. 1993. HRVATSKA mr. Dragutin Vuković MicroLAB, d.o.o. Savska cesta 41/VII 41000 ZAGREB SPECIALIZED SERVERS IN LOCAL AREA NETWORKS SPECIJALIZIRANI POSLUŽITELJI U LOKALNOJ MREŽI Summary: This paper discusses the idea of LAN attached computers' specialisation for narrow set of functions, offering specialised services to LAN participants. Case study of specialised server for CD- ROM contained databases is given. Sažetak: Obrazlaže se ideja specijalizacije računala u lokalnoj mreži za obavljanje posebnog skupa funkcija i pružanje specijaliziranih usluga ostalim sudionicima mreže. Prikazana je izvedba specijaliziranog poslužitelja koji pruža usluge korištenja baza podataka smještenih na CD-ROM diskovima. Introduction supporting complete commercial computing systems. While no vendor has yet succeeded to completely replace the For more than 30 years, the basic model of computing has traditional computing environment, the more nimble ones were revolved around large monolithic applications running on able to establish dominance in a substantial number of large, centralised mainframes. No matter what other technical computing niches that had not previously been effectively or architectural innovations have become available, they addressed. The most prominent of these niches, desktop either have been adapted to work with this basic model or computing, is now larger than mainframe comput-ing itself. discarded by mainstream information systems management. The proliferation of so many new kinds of computing system The reasons for the overwhelming loyalty of most IS inevitably raised the demand among users for these systems professionals to this traditional model are no mystery. For to be interconnected allowing data exchange and most of the history of computing, hardware was complex and synchronisation of their activities.
    [Show full text]
  • Netware 6.5 Storage Management Services Administration Guide
    Novell Confidential Manual (99a) 15 April 2004 Novell NetWare® 6.0 www.novell.com STORAGE MANAGEMENT SERVICES June 30, 2004 ADMINISTRATION GUIDE Novell Confidential Manual (99a) 15 April 2004 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. This product may require export authorization from the U.S. Department of Commerce prior to exporting from the U.S. or Canada. Copyright © 1999-2003 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher. U.S. Patent No. 5,157,663; 5,349,642; 5,455,932; 5,553,139; 5,553,143; 5,572,528; 5,594,863; 5,608,903; 5,633,931; 5,652,854; 5,671,414; 5,677,851; 5,692,129; 5,701,459; 5,717,912; 5,758,069; 5,758,344;
    [Show full text]
  • Novell Netware 6
    Manual December 10, 200289 Novell NetWare 6 www.novell.com OVERVIEW AND INSTALLATION GUIDE 100-004725-001 NetWare 6 Overview and Installation Guide 100-004725-001 February 25, 2003 Novell Confidential Manual December 10, 200289 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. This product may require export authorization from the U.S. Department of Commerce prior to exporting from the U.S. or Canada. Copyright © 2002 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher. U.S. Patent No. 5,157,663; 5,349,642; 5,455,932; 5,553,139; 5,553,143; 5,572,528; 5,594,863; 5,608,903; 5,633,931; 5,652,859; 5,671,414; 5,677,851; 5,692,129; 5,701,459;
    [Show full text]
  • Abkürzungs-Liste ABKLEX
    Abkürzungs-Liste ABKLEX (Informatik, Telekommunikation) W. Alex 1. Juli 2021 Karlsruhe Copyright W. Alex, Karlsruhe, 1994 – 2018. Die Liste darf unentgeltlich benutzt und weitergegeben werden. The list may be used or copied free of any charge. Original Point of Distribution: http://www.abklex.de/abklex/ An authorized Czechian version is published on: http://www.sochorek.cz/archiv/slovniky/abklex.htm Author’s Email address: [email protected] 2 Kapitel 1 Abkürzungen Gehen wir von 30 Zeichen aus, aus denen Abkürzungen gebildet werden, und nehmen wir eine größte Länge von 5 Zeichen an, so lassen sich 25.137.930 verschiedene Abkür- zungen bilden (Kombinationen mit Wiederholung und Berücksichtigung der Reihenfol- ge). Es folgt eine Auswahl von rund 16000 Abkürzungen aus den Bereichen Informatik und Telekommunikation. Die Abkürzungen werden hier durchgehend groß geschrieben, Akzente, Bindestriche und dergleichen wurden weggelassen. Einige Abkürzungen sind geschützte Namen; diese sind nicht gekennzeichnet. Die Liste beschreibt nur den Ge- brauch, sie legt nicht eine Definition fest. 100GE 100 GBit/s Ethernet 16CIF 16 times Common Intermediate Format (Picture Format) 16QAM 16-state Quadrature Amplitude Modulation 1GFC 1 Gigabaud Fiber Channel (2, 4, 8, 10, 20GFC) 1GL 1st Generation Language (Maschinencode) 1TBS One True Brace Style (C) 1TR6 (ISDN-Protokoll D-Kanal, national) 247 24/7: 24 hours per day, 7 days per week 2D 2-dimensional 2FA Zwei-Faktor-Authentifizierung 2GL 2nd Generation Language (Assembler) 2L8 Too Late (Slang) 2MS Strukturierte
    [Show full text]