ZyXEL P-964 User Guide - Page 46
A PAC must
View all ZyXEL P-964 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 46 highlights
P964 APR Cable Sharing Gateway with 4-port Switch IRC ISP LAN Linux Internet Relay Chat. IRC was developed in the late 1980s as a way for multiple users on a system to "chat" over the network. Today IRC is a very popular way to "talk" in real time with other people on the Internet. However, IRC is also one avenue hackers use to get information from you about your system and your company. Moreover, IRC sessions are prone to numerous attacks that while not dangerous can cause your system to crash. Internet Service Providers provide connections into the Internet for home users and businesses. There are local, regional, national, and global ISPs. You can think of local ISPs as the gatekeepers into the Internet. Local Area Network is a shared communication system to which many computers are attached. A LAN, as its name implies, is limited to a local area. This has to do more with the electrical characteristics of the medium than the fact that many early LANs were designed for departments, although the latter accurately describes a LAN as well. LANs have different topologies, the most common being the linear bus and the star configuration. A version of the UNIX operating system designed to run on IBM Compatible computers. Logic Bomb MAC MCNS MSO Name Resolution NAT NDIS NetBIOS Network NIC Node One-way Cable Modem PAC Packet Filter PAP Password Cracker Password encryption Password Shadowing Penetration Phreaking Ping Attack Pirate A virus that only activates itself when certain conditions are met. Logic bombs usually damage files or cause other serious problems when they are activated. On a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet address.) The MAC layer frames data for transmission over the network, then passes the frame to the physical layer interface where it is transmitted as a stream of bits. Multimedia Cable Network System is the consortium behind the DOCSIS standard for cable modems. Multiple Service Operators. A cable TV service provider that also provides other services such as data and/or voice telephony. The allocation of an IP address to a host name. See DNS Network Address Translation is the translation of an Internet Protocol address used within one network to a different IP address known within another network - see also SUA. Network Driver Interface Specification is a Windows specification for how communication protocol programs (such as TCP/IP) and network device drivers should communicate with each other. Network Basic Input / Output System. NetBIOS is an extension of the DOS BIOS that enables a PC to connect to and communicate with a LAN. Any time you connect 2 or more computers together so that they can share resources, you have a computer network. Connect 2 or more networks together and you have an internet. Network Interface Card. A board that provides network communication capabilities to and from a computer system. Also called an adapter. Any single computer connected to a network A one-way Cable Modem uses the TV cable for the downstream (receive) and a telephone modem for upstream (transmit). The box that calls/answers the phone call and relays the PPP frames to the PNS. A PAC must have IP and dial-up capability. A filter that scans packets and decides whether to let them through. Password Authentication Protocol PAP is a security protocol that requires users to enter a password before accessing a secure system. The user's name and password are sent over the wire to a server, where they are compared with a database of user account names and passwords. This technique is vulnerable to wiretapping (eavesdropping) because the password can be captured and used by someone to log onto the system. A program that uses a dictionary of words, phrases, names, etc. to guess a password. A system of encrypting electronic files using a single key or password. Anyone who knows the password can decrypt the file. The encrypted password is no visible in the passwd file but stored in a shadow file that is only readable by root. This prevents brute force attacks on the encrypted field to guess the password. see e.g.: http://whatis.com/shadowpa.htm Gaining access to computers or networks by bypassing security programs and passwords. Breaking into phone or other communication systems. Phreaking sites on the Internet are popular among crackers and other criminals An attack that slows down the network until it is unusable. The attacker sends a "ping" command to the network repeatedly to slow it down. See also Denial of Service. Someone who steals or distributes software without paying the legitimate owner for it. This category of computer criminal includes several different types of illegal activities Making copies of software for others to use. Distributing pirated software over the Internet or a Bulletin Board System. Receiving or downloading illegal copies of software in any form. H Glossary