Chapter 5 Glossary Of Terms - ZyXEL Communications ZyXEL ZyAIR A-6000 User Manual

High speed, long range ethernet wireless bridge
Hide thumbs Also See for ZyXEL ZyAIR A-6000:
Table of Contents

Advertisement

10BaseT
ARP
Authenticity
Back Door
Backbone
BackOrifice
Bandwidth
Bit
Brute Force
Hacking
Byte
Camping Out
Channel
CHAP
Cipher Text
Client
Cookie
Countermeasure
s
Cracker
Cracker Tools
Cracking
CLI commands
The 10-Mbps baseband Ethernet specification that uses two pairs of
twisted-pair cabling (Category 3 or 5): one pair for transmitting data and the
other for receiving data.
Address Resolution Protocol is a protocol for mapping an Internet Protocol
address (IP address) to a physical machine address that is recognized in the
local network.
Proof that the information came from the person or location that reportedly sent
it. One example of authenticating software is through digital signatures.
A deliberately planned security breach in a program. Back doors allow special
access to a computer or program. Sometimes back doors can be exploited and
allow a cracker unauthorized access to data.
A high-speed line or series of connections that forms a major pathway within a
network.
BackOrifice is a remote administration tool which allows a user to control a
computer across a TCP/IP connection using a simple console or GUI
application. BackOrifice is a potentially disastrous Trojan horse since it can
provide the user unlimited access to a system.
This is the capacity on a link usually measured in bits-per-second (bps).
(Binary Digit) -- A single digit number in base-2, in other words, either a 1 or a
zero. The smallest unit of computerized data.
A technique used to find passwords or encryption keys. Force Hacking involves
trying every possible combination of letters, numbers, etc. until the code is
broken.
A set of bits that represent a single character. There are 8 bits in a Byte.
Staying in a "safe" place once a hacker has broken into a system. The term
can be used with a physical location, electronic reference, or an entry point for
future attacks.
A specific frequency and bandwidth combination. In the present context, it
means TV channels for television services and downstream data for cable
modems.
Challenge Handshake Authentication Protocol is an alternative protocol that
avoids sending passwords over the wire by using a challenge/response
technique.
Text that has been scrambled or encrypted so that it cannot be read without
deciphering it. See Encryption
A software program that is used to contact and obtain data from a Server
software program on another computer. Each Client program is designed to
work with one or more specific kinds of Server programs, and each Server
requires a specific kind of Client. A Web Browser is a specific kind of Client.
A string of characters saved by a web browser on the user's hard disk. Many
web pages send cookies to track specific user information. Cookies can be used
to retain information as the user browses a web site. For example, cookies are
used to 'remember' the items a shopper may have in a shopping cart.
Techniques, programs, or other tools that can protect your computer against
threats.
Another term for hackers. Generally, the term cracker refers specifically to a
person who maliciously attempts to break encryption, software locks, or network
security.
Programs used to break into computers. Cracker tools are widely
distributed on the Internet. They include password crackers, Trojans, viruses,
war-dialers, and worms.
The act of breaking into computers or cracking encryptions.
A-6000 High Speed, Long Range Ethernet Wireless Bridge

Chapter 5 Glossary of Terms

5-1

Advertisement

Table of Contents
loading

Table of Contents