ZyXEL Communications Prestige 316 User Manual page 163

Broadband sharing gateway / wireless lan
Hide thumbs Also See for Prestige 316:
Table of Contents

Advertisement

Prestige 316 Broadband Sharing Gateway / Wireless LAN
NetBIOS
Network
NIC
Node
Packet
Packet Filter
PAP
Password
Cracker
Password
Encryption
Password
Shadowing
Penetration
Personal
Communication
Systems
Personal Digital
Communication
Phreaking
Ping Attack
Pirate
T
each other.
Network Basic Input / Output System. NetBIOS is an extension of the DOS BIOS that
enables a PC to connect to and communicate with a LAN.
Any time you connect 2 or more computers together so that they can share resources, you
have a computer network. Connect 2 or more networks together and you have an internet.
Network Interface Card. A board that provides network communication capabilities to and
from a computer system. Also called an adapter.
Any single computer connected to a network.
A basic message unit for communication across a network. A packet usually includes routing
information, data and (sometimes) error detection information.
A filter that scans packets and decides whether to let them through.
Password Authentication Protocol PAP is a security protocol that requires users to enter a
password before accessing a secure system. The user's name and password are sent over the
wire to a server, where they are compared with a database of user account names and
passwords. This technique is vulnerable to wiretapping (eavesdropping) because the password
can be captured and used by someone to log onto the system.
A program that uses a dictionary of words, phrases, names, etc. to guess a password.
A system of encrypting electronic files using a single key or password. Anyone who knows
the password can decrypt the file.
The encrypted password is not visible in the password file but stored in a shadow file that is
only readable by root. This prevents brute force attacks on the encrypted field to guess the
password. See e.g.:
http://whatis.com/shadowpa.htm
Gaining access to computers or networks by bypassing security programs and passwords.
PCS networks in the U.S. provide narrowband digital communications in the 900 MHz band
for paging and broadband digital communications in the 1,900 MHz band for cellular
telephone service. In the U.S., PCS 1,900 is the same as Global System for Mobile
Communications (GSM) 1,900.
PDC is used only in Japan and is rapidly being replaced with CDMA to alleviate
overcrowding of PDC bandwidth.
Breaking into phone or other communication systems. Phreaking sites on the Internet are
popular among crackers and other criminals.
An attack that slows down the network until it is unusable. The attacker sends a "ping"
command to the network repeatedly to slow it down. See also Denial of Service.
Someone who steals or distributes software without paying the legitimate owner for it. This
category of computer criminal includes several different types of illegal activities. Making
copies of software for others to use. Distributing pirated software over the Internet or a
Bulletin Board System. Receiving or downloading illegal copies of software in any form.
Glossary

Advertisement

Table of Contents
loading

Table of Contents