File Server - Cradlepoint ARC CBA850 Product Manual

Cellular broadband adapter
Hide thumbs Also See for ARC CBA850:
Table of Contents

Advertisement

CBA850 | USER MANUAL Firmware version 5.4.0
CRADLEPOINT
Domain name
A name that is associated with an IP address.
Download
To send a request from one computer to another and have the
file transmitted back to the requesting computer.
Drive-by Download
These attacks exploit vulnerabilities in your browser or its plugins
and helper applications when you simply surf to an attacker-
controlled website. Some computer attackers set up their own evil
websites that are designed to automatically attack and exploit
anyone that visits the website. Other attackers compromise
trusted websites such as ecommerce sites and deploy their
exploit software there. Often these attacks occur without the
victims realizing that they are under attack.
DSL
Digital Subscriber Line. High bandwidth Internet connection over
telephone lines.
Duplex
Sending and Receiving data transmissions at the same time.
Dynamic DNS service
Dynamic DNS is provided by companies to allow users with
Dynamic IP addresses to obtain a Domain Name that will always
be linked to their changing IP address. The IP address is updated
by either client software running on a computer or by a router that
supports Dynamic DNS, whenever the IP address changes.
© 2015 CRADLEPOINT, INC.
PLEASE VISIT
HTTP://KNOWLEDGEBASE.CRADLEPOINT.COM/
Dynamic IP address
IP address that is assigned by a DHCP server and that may
change. Cable Internet providers usually use this method to
assign IP addresses to their customers.
EAP
Extensible Authentication Protocol.
Email
Electronic Mail is a computer-stored message that is transmitted
over the Internet.
Encryption
Converting data into ciphertext so that it cannot be easily read.
Ethernet
The most widely used technology for Local Area Networks.
Exploit
Code that is designed to take advantage of a vulnerability. An
exploit is designed to give an attacker the ability to execute
additional malicious programs on the compromised system or to
provide unauthorized access to affected data or application.
Fiber optic
A method of sending data through light impulses over glass or
plastic wire or fiber.

File server

A computer on a network that stores data so that the other
computers on the network can access it.
FOR MORE HELP AND RESOURCES
PAGE 145

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents