McAfee VSF09EMB1RAA User Guide - Page 177

Messaging Application Programming Interface. A Microsoft interface specification

Page 177 highlights

Glossary 175 IP address Internet Protocol address. An address used to identify a computer or device on a TCP/IP network. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be 0 to 255 (for example, 192.168.1.100). IP spoofing Forging the IP addresses in an IP packet. This is used in many types of attacks including session hijacking. It is also often used to fake the email headers of spam so they cannot be properly traced. K key A series of letters and numbers used by two devices to authenticate their communication. Both devices must have the key. See also WEP (page 182), WPA (page 183), WPA2 (page 183), WPA2-PSK (page 183), WPA-PSK (page 183). L LAN Local Area Network. A computer network that spans a relatively small area (for example, a single building). Computers on a LAN can communicate with each other and share resources such as printers and files. launchpad A U3 interface component that acts as a starting point for launching and managing U3 USB programs. M MAC address Media Access Control address. A unique serial number assigned to a physical device (NIC, network interface card) accessing the network. man-in-the-middle attack A method of intercepting and possibly modifying messages between two parties without either party knowing that their communication link has been breached. MAPI Messaging Application Programming Interface. A Microsoft interface specification that allows different messaging and workgroup programs (including email, voicemail, and fax) to work through a single client, such as the Exchange client. message authentication code (MAC) A security code used to encrypt messages that are transmitted between computers. The message is accepted if the computer recognizes the decrypted code as valid. MSN Microsoft Network. A group of web-based services offered by Microsoft Corporation, including a search engine, email, instant messaging, and portal.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205

Glossary
175
IP address
Internet Protocol address. An address used to identify a computer or device on a TCP/IP
network. The format of an IP address is a 32-bit numeric address written as four numbers
separated by periods. Each number can be 0 to 255 (for example, 192.168.1.100).
IP spoofing
Forging the IP addresses in an IP packet. This is used in many types of attacks including
session hijacking. It is also often used to fake the email headers of spam so they cannot be
properly traced.
K
key
A series of letters and numbers used by two devices to authenticate their communication.
Both devices must have the key. See also
WEP
(page 182),
WPA
(page 183),
WPA2
(page
183),
WPA2-PSK
(page 183),
WPA-PSK
(page 183).
L
LAN
Local Area Network. A computer network that spans a relatively small area (for example, a
single building). Computers on a LAN can communicate with each other and share
resources such as printers and files.
launchpad
A U3 interface component that acts as a starting point for launching and managing U3 USB
programs.
M
MAC address
Media Access Control address. A unique serial number assigned to a physical device (NIC,
network interface card) accessing the network.
man-in-the-middle attack
A method of intercepting and possibly modifying messages between two parties without
either party knowing that their communication link has been breached.
MAPI
Messaging Application Programming Interface. A Microsoft interface specification that
allows different messaging and workgroup programs (including email, voicemail, and fax)
to work through a single client, such as the Exchange client.
message authentication code (MAC)
A security code used to encrypt messages that are transmitted between computers. The
message is accepted if the computer recognizes the decrypted code as valid.
MSN
Microsoft Network. A group of web-based services offered by Microsoft Corporation,
including a search engine, email, instant messaging, and portal.