Main
A
ACL: Access Control List
AES: Advanced Encryption Standard
ANSI: American National Standards Institute
API: Application Programming Interface
ASCII: American Standard Code for Information Interchange
ASN.1: Abstract Syntax Notation One
ASR: Automated System Recovery
B
BAT: Bacula Administration Tool
BMR: Bare Metal Recovery
BNF: BackusâNaur Form
BTRFS: B-tree File System
BVFS: Bacula Virtual FileSystem
C
CA: Certificate Authority
CBC: Cipher Block Chaining
CBT: Changed Block Tracking
CD: Compact Disk
CDP: Continous Data Protection
CDROM: Comptact Disk Read Only Memory
CIFS: Common Internet File System
CMS: Cryptographic Message Syntax
CN: Common Name
CPU:
CRAM: Challenge-Response Authentication Mechanism
CSV: Comma Separated Value
D
DC: Domain Controller
DDS: Digital Data Storage
DER: Distinguished Encoding Rules
DFS: Distributed File System
DFSR: Distributed File System Replication
DH: Diffie-Hellman
DHCP: Dynamic Host Configuration Protocole
DLT: Digital Linear Tape
DNS: Domain Name Service
DSA: Digital Signature Algorithm
DVD: Digital Video Disc
E
EOF: End Of File
F
FD: File Daemon
FQDN:
G
GNU: Gnu is not Unix
GPL: Gnu General Public License
GTK: Graphic ToolKit
GUI: Graphical User Interface
H
HFC: High File Count
HTTP: Hypertext Transfer Protocol
HTTPS: Hypertext Transfer Protocol Secure
I
IANA: Internet Assigned Numbers Authority
IP: Internet Protocol
ISO: International Organization for Standardization
K
KVM: Kernel-based Virtual Machine
L
LAN: Local Area Network
LTO: Linear Tape Open
LV: Logical Volume
LVM: Logical Volume Management
LZO: Lempel-Ziv-Oberhumer
M
MCJ: Maximum Concurrent Jobs
MD: Message Digest
MD5:
MSDE: Microsoft Database Engine
N
NAS: Network Attached Storage
NAT: Network Address Translation
NDMP: Network Data Management Protocol
NFS: Network File System
NIST: US National Institute of Standards and Technology
NSIS: Nullsoft Scriptable Install System
NTDS: NT Directory Service
NTFRS: NT File Replication Service
O
OS: Operating System
P
PEM: Privacy Enhanced Mail
PITR: Point In Time Recovery
PKE: Public-Key Encryption
PKI: Public-Key Infrastructure
POSIX: Portable Operating System Interface
R
RAID: Redundant Array of Independent Disks
RFC: Requests For Comments
RMAN: Oracle Recovery Manager
RPM: Red Hat Packet Manager
RSA: Rivest-Shamir-Adleman cryptosystem
S
SAN: Storage Area Network
SCSI: Small Computer System Interface
SD: Storage Daemon
SHA: Secure Hash Algorithm
SLA: Service Level Agreement
SQL: Structured Query Language
SSD: Solid-State Drive
SSH: Secure Shell
SSL: Secure Socket Layer
SVN: Subversion
T
TCP: Transmission Control Protocol
TLS: Transport Layer Security
TLS-PSK: Transport Layer Security pre-shared key ciphersuites
U
UEFI: Unified Extensible Firmware Interface
URI: Uniform Resource Identifier
URL: Uniform Resource Locator
UTF: Universal Character Set Transformation Format
V
VG: Volume Group
VSS: Volume Snapshot Service
W
WAN: Wide Area Network
WMI: Windows Management and Instrumentation
WORM: Write Once Read Many
X
XML:
Z
ZFS: Z File System
ZSTD: