ZyXEL P-964 User Guide - Page 48
Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP File Transfer
View all ZyXEL P-964 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 48 highlights
P964 APR Cable Sharing Gateway with 4-port Switch SATAN Server Set-Top Box Shoulder Surfing SID (Service ID) SNMP Snooping SOCKS SPAM messages every 60 seconds. A server also sends out SAP messages to inform other devices that it is closing down. Workstations use SAP to find services they need on the network. A UNIX program that gathers information on networks and stores it in databases. It is helpful in finding security flaws such as incorrect settings, software bugs and poor policy decisions. It shows network services that are running, the different types of hardware and software on the network, and other information. It was written to help users find security flaws in their network systems. A computer, or a software package, that provides a specific kind of service to client software running on other computers. A set-top box is a device that enables a television set to become a user interface to the Internet and also enables a television set to receive and decode digital television (DTV) broadcasts. Looking over someone's shoulder to see the numbers they dial on a phone, or the information they enter into a computer. Used in the DOCSIS standard to define a particular mapping between a cable modem (CM) and the CMTS. The SID is used for the purpose of upstream bandwidth allocation and class-of-service management. System Network Management Protocol is a popular management protocol defined by the Internet community for TCP/IP networks. It is a communication protocol for collecting information from devices on the network. Passively watching a network for information that could be used to a hacker's advantage, such as passwords. Usually done while Camping Out. A protocol that handles TCP traffic through proxy servers. Unwanted e-mail, usually in the form of advertisements. Splitter Spoofing SSL (Secured Socket Layer) STP Straight through Ethernet cable SUA Subscriber Unit (SU) TCP Telnet Tempest Terminal Terminal Software TFTP Three-way Cable Modem Trojan or Trojan Horse Two-way Cable Modem UDP UNIX Passive devices that divide the traffic on trunk cables and send it down feeder cables. To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide their location and identity Technology that allows you to send information that only the server can read. SSL allows servers and browsers to encrypt data as they communicate with each other. This makes it very difficult for third parties to understand the communications. Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are twisted together to form a pair, and the pair form a balanced circuit. The twisting prevents interference problems. STP (shielded twisted-pair) provides protection against external crosstalk. A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for example, a data terminal equipment (DTE) device and a data communications equipment (DCE) device. A straight through Ethernet cable is the most common cable used. Single User Account - The Prestige's SUA (Single User Account) feature allows multiple user Internet access for the cost of a single ISP account - see also NAT. An alternate term for cable modem. Transmission Control Protocol handles flow control and packet recovery and IP providing basic addressing and packet-forwarding services. Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems. Illegal interception of data from computers and video signals. A device that allows you to send commands to a computer somewhere else. At a minimum, this usually means a keyboard and a display screen and some simple circuitry. Software that pretends to be (emulates) a physical terminal and allows you to type commands to a computer somewhere else. Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP (File Transfer Protocol), but it is scaled back in functionality so that it requires fewer resources to run. TFTP uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). A three-way cable modem is a hybrid that can uses either a telephone modem or the TV cable for the upstream traffic. Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed to look innocuous. Yet, when you run the program it installs a virus or memory resident application that can steal passwords, corrupt data, or provide hackers a back door into your computer. Trojan applications are particularly dangerous since they can often run exactly as expected without showing any visible signs of intrusion. A two-way Cable Modem uses the TV cable for both downstream and upstream traffic. UDP is a connectionless transport service that dispenses with the reliability services provided by TCP. UDP gives applications a direct interface with IP and the ability to address a particular application process running on a host via a port number without setting up a connection session. A widely used operating system in large networks. J Glossary