ZyXEL Communications Prestige 964 User Manual page 48

Cable router
Hide thumbs Also See for Prestige 964:
Table of Contents

Advertisement

Prestige 944S Cable Sharing Gateway with 4-port Switch
NetBIOS
Network Basic Input / Output System. NetBIOS is an extension of the DOS BIOS that enables a
PC to connect to and communicate with a LAN.
Network
Any time you connect 2 or more computers together so that they can share resources, you have a
computer network. Connect 2 or more networks together and you have an internet.
NIC
Network Interface Card. A board that provides network communication capabilities to and from
a computer system. Also called an adapter.
Node
Any single computer connected to a network
One-way Cable
A one-way Cable Modem uses the TV cable for the downstream (receive) and a telephone
Modem
modem for upstream (transmit).
PAC
The box that calls/answers the phone call and relays the PPP frames to the PNS. A PAC must
have IP and dial-up capability.
Packet Filter
A filter that scans packets and decides whether to let them through.
PAP
Password Authentication Protocol PAP is a security protocol that requires users to enter a
password before accessing a secure system. The user's name and password are sent over the wire
to a server, where they are compared with a database of user account names and passwords. This
technique is vulnerable to wiretapping (eavesdropping) because the password can be captured
and used by someone to log onto the system.
Password Cracker
A program that uses a dictionary of words, phrases, names, etc. to guess a password.
Password encryption
A system of encrypting electronic files using a single key or password. Anyone who knows the
password can decrypt the file.
Password
The encrypted password is no visible in the passwd file but stored in a shadow file that is only
Shadowing
readable by root. This prevents brute force attacks on the encrypted field to guess the password.
see e.g.:
Penetration
Gaining access to computers or networks by bypassing security programs and passwords.
Phreaking
Breaking into phone or other communication systems. Phreaking sites on the Internet are popular
among crackers and other criminals
Ping Attack
An attack that slows down the network until it is unusable. The attacker sends a "ping" command
to the network repeatedly to slow it down. See also Denial of Service.
Pirate
Someone who steals or distributes software without paying the legitimate owner for it. This
category of computer criminal includes several different types of illegal activities Making copies
of software for others to use. Distributing pirated software over the Internet or a Bulletin Board
System. Receiving or downloading illegal copies of software in any form.
Pirated Software
Software that has been illegally copied, or that is being used in violation of the software's
licensing agreement. Pirated software is often distributed through pirate bulletin boards or on the
Internet. In the internet underground it is known as Warez.
Plain Text
The opposite of Cipher Text, Plain Text is readable by anyone.
PNS
PPTP Network Server. A PNS must have IP connectivity.
POP
Post Office Protocol. This is a common protocol used for sending, receiving, and delivering mail
messages.
Port
An Internet port refers to a number that is part of a URL, appearing after a colon (:) right after
the domain name. Every service on an Internet server listens on a particular port number on that
server. Most services have standard port numbers, e.g. Web servers normally listen on port 80.
J
http://whatis.com/shadowpa.htm
Glossary

Advertisement

Table of Contents
loading

Table of Contents