The first part of the address indicates what protocol to use and the second part
specifies the IP address or the domain name where the resource is located.
For example, in http://www.novell.com, http is the protocol to use.
vulnerabilities
An aspect of a system or network that leaves it open to attack. Characteristics of
computer systems that allow an individual to keep it from correctly operating or
that allows unauthorized users to take control of the system. Design, administrative,
or implementation weaknesses or flaws in hardware, firmware, or software. If ex-
ploited, a vulnerability could lead to an unacceptable impact in the form of unau-
thorized access to information or disruption of critical processing.
AppArmor Glossary
331