ZyXEL Omni 56K USB Lite User Guide - Page 93

Password, Cracker, Encryption, Shadowing, PHONE, Pirate, Pirated, Software, Plain Text, Point of,

Page 93 highlights

Omni 56K USB Lite Password Cracker Password Encryption Password Shadowing PBX PC PHONE Pirate Pirated Software Plain Text Point of Demarcation Port Port (H/W) character, resulting in an even number of set bits. A program that uses a dictionary of words, phrases, names, etc. to guess a password. A system of encrypting electronic files using a single key or password. Anyone who knows the password can decrypt the file. The storage of a user's username and password in a network administrator database. Private Branch eXchange is a small version of the phone company's larger central switching office. A PBX is a private telephone switch. It is connected to groups of lines from one or more central offices and to all of the telephones at the location served by the PBX. Personal Computer - acronym for computers which are compatible with the IBM PC or AT computers. Jack that a telephone set may be connected. Someone who steals or distributes software without paying the legitimate owner for it. This category of computer criminal includes several different types of illegal activities. Making copies of software for others to use. Distributing pirated software over the Internet or a Bulletin Board System. Receiving or downloading illegal copies of software in any form. Software that has been illegally copied, or that is being used in violation of the software's licensing agreement. Pirated software is often distributed through pirate bulletin boards or on the Internet. In the internet underground it is known as Warez. The opposite of Cipher Text, Plain Text is readable by anyone. The physical point where the phone company ends its responsibility with the wiring of the phone line. An Internet port refers to a number that is part of a URL, appearing after a colon (:) right after the domain name. Every service on an Internet server listens on a particular port number on that server. Most services have standard port numbers, e.g., Web servers normally listen on port 80. An interface on a computer for connecting peripherals or devices to the computer. A printer port, for example, is an interface that is designed to have a printer connected to it. Ports can be defined by specific hardware (such as a Glossary O

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102

Omni 56K USB Lite
Glossary
O
character, resulting in an even number of set bits.
Password
Cracker
A program that uses a dictionary of words, phrases, names, etc. to guess a
password.
Password
Encryption
A system of encrypting electronic files using a single key or password. Anyone
who knows the password can decrypt the file.
Password
Shadowing
The storage of a user's username and password in a network administrator
database.
PBX
Private Branch eXchange is a small version of the phone company's larger
central switching office. A PBX is a private telephone switch. It is connected to
groups of lines from one or more central offices and to all of the telephones at
the location served by the PBX.
PC
Personal Computer - acronym for computers which are compatible with the IBM
PC or AT computers.
PHONE
Jack that a telephone set may be connected.
Pirate
Someone who steals or distributes software without paying the legitimate owner
for it. This category of computer criminal includes several different types of
illegal activities. Making copies of software for others to use. Distributing pirated
software over the Internet or a Bulletin Board System. Receiving or
downloading illegal copies of software in any form.
Pirated
Software
Software that has been illegally copied, or that is being used in violation of the
software's licensing agreement. Pirated software is often distributed through
pirate bulletin boards or on the Internet. In the internet underground it is known
as Warez.
Plain Text
The opposite of Cipher Text, Plain Text is readable by anyone.
Point of
Demarcation
The physical point where the phone company ends its responsibility with the
wiring of the phone line.
Port
An Internet port refers to a number that is part of a URL, appearing after a colon
(:) right after the domain name. Every service on an Internet server listens on a
particular port number on that server. Most services have standard port
numbers, e.g., Web servers normally listen on port 80.
Port (H/W)
An interface on a computer for connecting peripherals or devices to the
computer. A printer port, for example, is an interface that is designed to have a
printer connected to it. Ports can be defined by specific hardware (such as a