ZyXEL P-964 User Guide - Page 48

Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP File Transfer

Page 48 highlights

P964 APR Cable Sharing Gateway with 4-port Switch SATAN Server Set-Top Box Shoulder Surfing SID (Service ID) SNMP Snooping SOCKS SPAM messages every 60 seconds. A server also sends out SAP messages to inform other devices that it is closing down. Workstations use SAP to find services they need on the network. A UNIX program that gathers information on networks and stores it in databases. It is helpful in finding security flaws such as incorrect settings, software bugs and poor policy decisions. It shows network services that are running, the different types of hardware and software on the network, and other information. It was written to help users find security flaws in their network systems. A computer, or a software package, that provides a specific kind of service to client software running on other computers. A set-top box is a device that enables a television set to become a user interface to the Internet and also enables a television set to receive and decode digital television (DTV) broadcasts. Looking over someone's shoulder to see the numbers they dial on a phone, or the information they enter into a computer. Used in the DOCSIS standard to define a particular mapping between a cable modem (CM) and the CMTS. The SID is used for the purpose of upstream bandwidth allocation and class-of-service management. System Network Management Protocol is a popular management protocol defined by the Internet community for TCP/IP networks. It is a communication protocol for collecting information from devices on the network. Passively watching a network for information that could be used to a hacker's advantage, such as passwords. Usually done while Camping Out. A protocol that handles TCP traffic through proxy servers. Unwanted e-mail, usually in the form of advertisements. Splitter Spoofing SSL (Secured Socket Layer) STP Straight through Ethernet cable SUA Subscriber Unit (SU) TCP Telnet Tempest Terminal Terminal Software TFTP Three-way Cable Modem Trojan or Trojan Horse Two-way Cable Modem UDP UNIX Passive devices that divide the traffic on trunk cables and send it down feeder cables. To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide their location and identity Technology that allows you to send information that only the server can read. SSL allows servers and browsers to encrypt data as they communicate with each other. This makes it very difficult for third parties to understand the communications. Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are twisted together to form a pair, and the pair form a balanced circuit. The twisting prevents interference problems. STP (shielded twisted-pair) provides protection against external crosstalk. A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for example, a data terminal equipment (DTE) device and a data communications equipment (DCE) device. A straight through Ethernet cable is the most common cable used. Single User Account - The Prestige's SUA (Single User Account) feature allows multiple user Internet access for the cost of a single ISP account - see also NAT. An alternate term for cable modem. Transmission Control Protocol handles flow control and packet recovery and IP providing basic addressing and packet-forwarding services. Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems. Illegal interception of data from computers and video signals. A device that allows you to send commands to a computer somewhere else. At a minimum, this usually means a keyboard and a display screen and some simple circuitry. Software that pretends to be (emulates) a physical terminal and allows you to type commands to a computer somewhere else. Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP (File Transfer Protocol), but it is scaled back in functionality so that it requires fewer resources to run. TFTP uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). A three-way cable modem is a hybrid that can uses either a telephone modem or the TV cable for the upstream traffic. Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed to look innocuous. Yet, when you run the program it installs a virus or memory resident application that can steal passwords, corrupt data, or provide hackers a back door into your computer. Trojan applications are particularly dangerous since they can often run exactly as expected without showing any visible signs of intrusion. A two-way Cable Modem uses the TV cable for both downstream and upstream traffic. UDP is a connectionless transport service that dispenses with the reliability services provided by TCP. UDP gives applications a direct interface with IP and the ability to address a particular application process running on a host via a port number without setting up a connection session. A widely used operating system in large networks. J Glossary

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51

P964 APR Cable Sharing Gateway with 4-port Switch
J
Glossary
messages every 60 seconds. A server also sends out SAP messages to inform other devices that it
is closing down. Workstations use SAP to find services they need on the network.
SATAN
A UNIX program that gathers information on networks and stores it in databases. It is helpful in
finding security flaws such as incorrect settings, software bugs and poor policy decisions. It
shows network services that are running, the different types of hardware and software on the
network, and other information. It was written to help users find security flaws in their network
systems.
Server
A computer, or a software package, that provides a specific kind of service to client software
running on other computers.
Set-Top Box
A set-top box is a device that enables a television set to become a user interface to the Internet
and also enables a television set to receive and decode digital television (DTV) broadcasts.
Shoulder Surfing
Looking over someone's shoulder to see the numbers they dial on a phone, or the information
they enter into a computer.
SID (Service ID)
Used in the DOCSIS standard to define a particular mapping between a cable modem (CM) and
the CMTS. The SID is used for the purpose of upstream bandwidth allocation and
class-of-service management.
SNMP
System Network Management Protocol is a popular management protocol defined by the Internet
community for TCP/IP networks. It is a communication protocol for collecting information from
devices on the network.
Snooping
Passively watching a network for information that could be used to a hacker's advantage, such as
passwords. Usually done while Camping Out.
SOCKS
A protocol that handles TCP traffic through proxy servers.
SPAM
Unwanted e-mail, usually in the form of advertisements.
Splitter
Passive devices that divide the traffic on trunk cables and send it down feeder cables.
Spoofing
To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide
their location and identity
SSL (Secured Socket
Layer)
Technology that allows you to send information that only the server can read. SSL allows servers
and browsers to encrypt data as they communicate with each other. This makes it very difficult
for third parties to understand the communications.
STP
Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are
twisted together to form a pair, and the pair form a balanced circuit. The twisting prevents
interference problems. STP (shielded twisted-pair) provides protection against external crosstalk.
Straight through
Ethernet cable
A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for
example, a data terminal equipment (DTE) device and a data communications equipment (DCE)
device. A straight through Ethernet cable is the most common cable used.
SUA
Single User Account – The Prestige's SUA (Single User Account) feature allows multiple user
Internet access for the cost of a single ISP account - see also NAT.
Subscriber Unit (SU)
An alternate term for cable modem.
TCP
Transmission Control Protocol handles flow control and packet recovery and IP providing basic
addressing and packet-forwarding services.
Telnet
Telnet is the login and terminal emulation protocol common on the Internet and in UNIX
environments. It operates over TCP/IP networks. Its primary function is to allow users to log into
remote host systems.
Tempest
Illegal interception of data from computers and video signals.
Terminal
A device that allows you to send commands to a computer somewhere else. At a minimum, this
usually means a keyboard and a display screen and some simple circuitry.
Terminal Software
Software that pretends to be (emulates) a physical terminal and allows you to type commands to
a computer somewhere else.
TFTP
Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP (File Transfer
Protocol), but it is scaled back in functionality so that it requires fewer resources to run. TFTP
uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol).
Three-way Cable
Modem
A three-way cable modem is a hybrid that can uses either a telephone modem or the TV cable for
the upstream traffic.
Trojan or Trojan
Horse
Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed to look
innocuous. Yet, when you run the program it installs a virus or memory resident application that
can steal passwords, corrupt data, or provide hackers a back door into your computer. Trojan
applications are particularly dangerous since they can often run exactly as expected without
showing any visible signs of intrusion.
Two-way Cable
Modem
A two-way Cable Modem uses the TV cable for both downstream and upstream traffic.
UDP
UDP is a connectionless transport service that dispenses with the reliability services provided by
TCP. UDP gives applications a direct interface with IP and the ability to address a particular
application process running on a host via a port number without setting up a connection session.
UNIX
A widely used operating system in large networks.