Fujitsu S6520 S6520 User's Guide - Page 158

Synchronous Dynamic Random Access Memory., SDRAM, Serial Port, Shared key authentication, Standby

Page 158 highlights

ROM Read Only Memory. A form of memory in which information is stored by physically altering the material. Data stored in this way can not be changed by your notebook and does not require power to maintain it. SDRAM Synchronous Dynamic Random Access Memory. Serial Port A connection to another device through which data is transferred one bit at a time on a single wire with any other wires only for control of the device not for transfer of data. Shared key authentication 802.11 network authentication method in which the AP sends the client device a challenge text packet that the client must then encrypt with the correct WEP key and return to the AP. If the client has the wrong key or no key, authentication will fail and the client will not be allowed to associate with the AP. Shared key authentication is not considered secure, because a hacker who detects both the clear-text challenge and the same challenge encrypted with a WEP key can decipher the key. SSID Service Set Identifier, a 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to the BSS. The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. A device will not be permitted to join the BSS unless it can provide the unique SSID. Because the SSID is broadcast in plain text, it does not supply any security to the network. Standby To make inoperative for a period of time. Your LifeBook notebook uses various suspension states to reduce power consumption and prolong the charge of your battery. 153 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203

153
-
ROM
Read Only Memory. A form of memory in which information is stored by physically altering the material.
Data stored in this way can not be changed by your notebook and does not require power to maintain it.
SDRAM
Synchronous Dynamic Random Access Memory.
Serial Port
A connection to another device through which data is transferred one bit at a time on a single wire with
any other wires only for control of the device not for transfer of data.
Shared key authentication
802.11 network authentication method in which the AP sends the client device a challenge text packet that
the client must then encrypt with the correct WEP key and return to the AP. If the client has the wrong key
or no key, authentication will fail and the client will not be allowed to associate with the AP. Shared key
authentication is not considered secure, because a hacker who detects both the clear-text challenge and the
same challenge encrypted with a WEP key can decipher the key.
SSID
Service Set Identifier, a 32-character unique identifier attached to the header of packets sent over a WLAN
that acts as a password when a mobile device tries to connect to the BSS. The SSID differentiates one
WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must
use the same SSID. A device will not be permitted to join the BSS unless it can provide the unique SSID.
Because the SSID is broadcast in plain text, it does not supply any security to the network.
Standby
To make inoperative for a period of time. Your LifeBook notebook uses various suspension states to
reduce power consumption and prolong the charge of your battery.