ZyXEL Communications ZyXEL ZYWALL10 User Manual page 260

Internet security gateway
Hide thumbs Also See for ZyXEL ZYWALL10:
Table of Contents

Advertisement

ZyWALL 10 Internet Security Gateway
security flaws in their network systems.
Server
A computer, or a software package, that provides a specific kind of service to client
software running on other computers.
Shoulder Surfing
Looking over someone's shoulder to see the numbers they dial on a phone, or the
information they enter into a computer.
SNMP
System Network Management Protocol is a popular management protocol defined by
the Internet community for TCP/IP networks. It is a communication protocol for
collecting information from devices on the network.
Snooping
Passively watching a network for information that could be used to a hacker's
advantage, such as passwords. Usually done while Camping Out.
SOCKS
A protocol that handles TCP traffic through proxy servers.
SPAM
Unwanted e-mail, usually in the form of advertisements.
Spoofing
To forge something, such as an IP address. IP Spoofing is a common way for hackers
to hide their location and identity
SSL (Secured
Technology that allows you to send information that only the server can read. SSL
Socket Layer)
allows servers and browsers to encrypt data as they communicate with each other. This
makes it very difficult for third parties to understand the communications.
STP
Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires
are twisted together to form a pair, and the pair form a balanced circuit. The twisting
prevents interference problems. STP (shielded twisted-pair) provides protection against
external crosstalk.
Straight through
A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices,
Ethernet cable
for example, a data terminal equipment (DTE) device and a data communications
equipment (DCE) device. A straight through Ethernet cable is the most common cable
used.
SUA
Single User Account – The ZyWALL's SUA (Single User Account) feature allows
multiple user Internet access for the cost of a single ISP account - see also NAT.
TCP
Transmission Control Protocol handles flow control and packet recovery and IP
providing basic addressing and packet-forwarding services.
Telnet
Telnet is the login and terminal emulation protocol common on the Internet and in UNIX
environments. It operates over TCP/IP networks. Its primary function is to allow users to
log into remote host systems.
Tempest
Terminal
A device that allows you to send commands to a computer somewhere else. At a
minimum, this usually means a keyboard and a display screen and some simple
circuitry.
Terminal Software
Software that pretends to be (emulates) a physical terminal and allows you to type
commands to a computer somewhere else.
V
Illegal interception of data from computers and video signals.
Glossary of Terms

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 10

Table of Contents