This glossary contains terms that are frequently used in this guide as well as in Evolution™.


A tool that guides a user through a series of steps, usually to configure or set up a program. Equivalent to Wizard and Druid.


Any file sent with an e-mail. Attachments can be embedded in a message or appended to it.

automatic indexing

A pre-downloading procedure that allows Novell® Evolution™ to quickly refer to data. It enables faster searches and decreases memory usage for data displays.

Bcc (Blind Carbon Copy)

Blind copy recipients (Bcc) receive a copy of an item. Other recipients receive no information about blind copies. Only the sender and the blind copy recipient know that a blind copy was sent. If a recipient replies and chooses Reply to All, the blind copy recipient does not receive the reply.

Cc (Carbon Copy)

Carbon copy recipients (CC) receive a copy of an item. CC recipients are users who would benefit from the information in an item, but are not affected by or directly responsible for it. All recipients can see that a carbon copy was sent. They can also see the names of the CC recipients.


A small application that controls the transfer of data between a handheld device and a desktop computer.


The GNOME groupware application.


To run a program. Any file that can be run is called an executable. Evolution can download executable attachments, but before they can be run, the files must be marked as executable with a shell or file manager. This security precaution prevents the automatic or accidental execution of malicious programs. For more information on executables and file permissions, see the documentation for your file manager or shell.


When messages are marked for deletion, they remain until they are expunged. When a message is expunged, it is permanently deleted, as long as it was marked for deletion.

file tree

A way of describing a group of files on a computer. The top of the tree is called the root directory, and is denoted by /. The rest of the branches spread downward from the root. Don't confuse the root directory with the root account or root's home directory, normally /root.


Within Evolution, a filter is a method of sorting mail automatically when it is downloaded. You can create filters to perform one or more actions on a message that meets any (or all) of a wide range of criteria.


Forwards a copy of the message and any additional comments to a different e-mail address.


A term describing an application that helps groups of people work together. Typically, a groupware application has several productivity features built into one program, including e-mail, calendar, and address book tools.


Hypertext Markup Language (HTML) is a language for describing page layout in electronic documents such as Web pages, help files, and e-mail messages. HTML can be used in e-mail and news posts to insert images and apply text treatments.


iCal is a protocol that Evolution uses to manage the calendar section.


Internet Mail Access Protocol. It allows access to e-mail that is typically stored remotely on a server rather than on a local hard disk. Often contrasted with POP.


Displayed as part of a message or other document, rather than attached as a separate file. Contrast with attachment.


Lightweight Directory Access Protocol. Allows a client to search through a large database of addresses, phone numbers, and people stored on a server.

mail client

The application with which a person reads and sends e-mail. Its counterparts are the various types of mail servers, which handle user authentication and direct messages from the sender to the recipient.


Post Office Protocol. A mechanism for e-mail transport. In contrast to IMAP, it is used only to get mail from a server and store it locally on your hard disk.


An agreed-upon method of communication, especially one for sending particular types of information between computer systems. Examples include POP (Post Office Protocol), for e-mail, and HTTP (HypterText Transfer Protocol) for Web pages.

public key encryption

A strong encryption method that uses a set of two keys, one of which is made public, and one of which is kept private. Data encrypted using the public key can only be decrypted using the private key. The longer the keys, the more difficult it is to break the encryption.

regular expression

A regular expression (regex) is a way of describing a string of text using metacharacters or wildcard symbols. For example, the statement fly.*so[au]p means any phrase beginning with “fly” and ending in “soup” or “soap”. If you searched for that expression, you'd find both “fly in my soup” and “fly in my soap.” For more information, enter man grep from the command line.


A program written in an interpreted (rather than compiled) language. Often used as a synonym for macro, to denote a series of prerecorded commands or actions within an application. Scripts are used to accomplish repetitive and tedious tasks, to save the user time.

search base

LDAP can break contact lists into many groups. The search base tells LDAP the top group to use. How much of the Search Base to search is set by the Search Scope option.

search folder

An e-mail organization tool. Search folders allow you to create a folder that contains the results of a complex search. Search folder contents are updated dynamically.

search scope

Search Scope states how much of the search base to search.


A program that sends mail. Evolution can use it instead of SMTP; some people prefer it because it offers more flexibility; however, it is more difficult to set up.


An area of Evolution that offers users fast access to the most frequently used features of the application.


Text placed at the end of every e-mail sent, similar to a hand-written signature at the bottom of a written letter. A signature can be anything from a favorite quotation to a link to a Web page; courtesy dictates that it be fewer than four lines long.


Simple Mail Transfer Protocol. The most common way of transporting mail messages from your computer to the server.


A small box of explanatory text that appears when the mouse pointer is held over a button or other interface element.


A program that inserts itself into other files or programs. When executed, it spreads to more programs and other computers. A virus can cause substantial damage by clogging networks or disk drives, deleting files, or opening security holes.


A file format for the exchange of contact information. When you get an address card attached to an e-mail, it is probably in vCard format.