ZyXEL Communications Prestige 316 User Manual page 166

Broadband sharing gateway / wireless lan
Hide thumbs Also See for Prestige 316:
Table of Contents

Advertisement

SPAM
Spoofing
SSL (Secured
Socket Layer)
Station (STA)
STP
Straight-
through
Ethernet Cable
SUA
TCP
Telnet
Tempest
Terminal
Terminal
Emulation
Software
TFTP
Trojan or Trojan
Horse
UDP
Glossary
Unwanted email, usually in the form of advertisements.
To forge something, such as an IP address. IP spoofing is a common way for hackers to hide
their location and identity.
Technology that allows you to send information that only the server can read. SSL allows
servers and browsers to encrypt data as they communicate with each other. This makes it very
difficult for third parties to understand the communications.
Any device that contains an IEEE 802.11 conformant medium access control (MAC) and
physical layer (PHY) interface to the wireless medium (WM).
Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are
twisted together to form a pair and the pair form a balanced circuit. The twisting prevents
interference problems. STP (shielded twisted-pair) provides protection against external
crosstalk.
A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for
example, a data terminal equipment (DTE) device and a data communications equipment
(DCE) device. A straight-through Ethernet cable is the most common cable used.
Single User Account – The Prestige's SUA (Single User Account) feature allows multiple
user Internet access for the cost of a single ISP account.
Transmission Control Protocol handles flow control and packet recovery and IP providing
basic addressing and packet-forwarding services.
Telnet is the login and terminal emulation protocol common on the Internet and in UNIX
environments. It operates over TCP/IP networks. Its primary function is to allow users to log
into remote host systems.
Illegal interception of data from computers and video signals.
A device that allows you to send commands to a computer somewhere else. At a minimum,
this usually means a keyboard and a display screen and some simple circuitry.
Software that pretends to be (emulates) a physical terminal and allows you to type commands
to a computer somewhere else.
Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP (File Transfer
Protocol), but it is scaled back in functionality so that it requires fewer resources to run. TFTP
uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol).
Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed to look
innocuous. Yet, when you run the program it installs a virus or memory resident application
that can steal passwords, corrupt data, or provide hackers a back door into your computer.
Trojan applications are particularly dangerous since they can often run exactly as expected
without showing any visible signs of intrusion.
UDP is a connectionless transport service that dispenses with the reliability services provided
by TCP. UDP gives applications a direct interface with IP and the ability to address a
particular application process running on a host via a port number without setting up a
connection session.
Prestige 316 Broadband Sharing Gateway / Wireless LAN
W

Advertisement

Table of Contents
loading

Table of Contents