ZyXEL Communications ZyXEL ZyAIR A-6000 User Manual page 43

High speed, long range ethernet wireless bridge
Hide thumbs Also See for ZyXEL ZyAIR A-6000:
Table of Contents

Advertisement

Ping Attack
Pirate
Pirated Software
Plain Text
PNS
POP
Port
Port (H/W)
POTS
PPP
PPTP
Promiscuous
Packet Capture
Protocol
Proxy Server
Public Key
Encryption
PVC
CLI commands
An attack that slows down the network until it is unusable. The attacker sends a
"ping" command to the network repeatedly to slow it down. See also Denial of
Service.
Someone who steals or distributes software without paying the legitimate owner
for it. This category of computer criminal includes several different types of
illegal activities Making copies of software for others to use. Distributing pirated
software over the Internet or a Bulletin Board System. Receiving or
downloading illegal copies of software in any form.
Software that has been illegally copied, or that is being used in violation of the
software's licensing agreement. Pirated software is often distributed through
pirate bulletin boards or on the Internet. In the internet underground it is known
as Warez.
The opposite of Cipher Text, Plain Text is readable by anyone.
PPTP Network Server. A PNS must have IP connectivity.
Post Office Protocol. This is a common protocol used for sending, receiving,
and delivering mail messages.
An Internet port refers to a number that is part of a URL, appearing after a colon
(:) right after the domain name. Every service on an Internet server listens on a
particular port number on that server. Most services have standard port
numbers, e.g. Web servers normally listen on port 80.
An interface on a computer for connecting peripherals or devices to the
computer. A printer port, for example, is an interface that is designed to have a
printer connected to it. Ports can be defined by specific hardware (such as a
keyboard port) or through software.
Plain Old Telephone Service is the analog telephone service that runs over
copper twisted-pair wires and is based on the original Bell telephone system.
Twisted-pair wires connect homes and businesses to a neighborhood central
office. This is called the local loop. The central office is connected to other
central offices and long-distance facilities.
Point to Point Protocol. PPP encapsulates and transmits IP (Internet Protocol)
datagrams over serial point-to-point links. PPP works with other protocols such
as IPX (Internetwork Packet Exchange). The protocol is defined in IETF
(Internet Engineering Task Force) RFC 1661 through 1663. PPP provides
router-to-router, host-to-router, and host-to-host connections.
Point-to-Point Tunneling Protocol.
Actively capturing packet information from a network. Most computers only
collect packets specifically addressed to them. Promiscuous packet capture
acquires all network traffic it can regardless of where the packets are
addressed.
A "language" for communicating on a network. Protocols are sets of standards
or rules used to define, format, and transmit data across a network. There are
many different protocols used on networks. For example, most web pages are
transmitted using the HTTP protocol.
A server that performs network operations in lieu of other systems on the
network. Proxy Servers are most often used as part of a firewall to mask the
identity of users inside a corporate network yet still provide access to the
Internet. When a user connects to a proxy server, via a web browser or other
networked application, he submits commands to the proxy server. The server
then submits those same commands to the Internet, yet without revealing any
information about the system that originally requested the information. Proxy
servers are an ideal way to also have all users on a corporate network channel
through one point for all external communications. Proxy servers can be
configured to block certain kinds of connections and stop some hacks.
System of encrypting electronic files using a key pair. The key pair contains a
public key used during encryption, and a corresponding private key used during
decryption.
Permanent Virtual Circuit. A PVC is a logical point-to-point circuit between
customer sites. PVCs are low-delay circuits because routing decisions do not
A-6000 High Speed, Long Range Ethernet Wireless Bridge
5-5

Advertisement

Table of Contents
loading

Table of Contents