ZyXEL Communications ZyXEL ZyAIR A-6000 User Manual page 45

High speed, long range ethernet wireless bridge
Hide thumbs Also See for ZyXEL ZyAIR A-6000:
Table of Contents

Advertisement

SUA
TCP
Telnet
Tempest
Terminal
Terminal
Software
TFTP
Trojan or Trojan
Horse
UDP
UNIX
URL
VPN
Vulnerability
WAN
War Dialer
Warez
Web
Configurator
Wire Tapping
Worm
CLI commands
the most common cable used.
Single User Account – The Prestige's SUA (Single User Account) feature allows
multiple user Internet access for the cost of a single ISP account - see also
NAT.
Transmission Control Protocol handles flow control and packet recovery and IP
providing basic addressing and packet-forwarding services.
Telnet is the login and terminal emulation protocol common on the Internet and
in UNIX environments. It operates over TCP/IP networks. Its primary function is
to allow users to log into remote host systems.
Illegal interception of data from computers and video signals.
A device that allows you to send commands to a computer somewhere else. At
a minimum, this usually means a keyboard and a To display screen and some
simple circuitry.
Software that pretends to be (emulates) a physical terminal and allows you to
type commands to a computer somewhere else.
Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP
(File Transfer Protocol), but it is scaled back in functionality so that it requires
fewer resources to run. TFTP uses the UDP (User Datagram Protocol) rather
than TCP (Transmission Control Protocol).
Like the fabled gift to the residents of Troy, a Trojan Horse is an application
designed to look innocuous. Yet, when you run the program it installs a virus or
memory resident application that can steal passwords, corrupt data, or provide
hackers a back door into your computer. Trojan applications are particularly
dangerous since they can often run exactly as expected without showing any
visible signs of intrusion.
UDP is a connectionless transport service that dispenses with the reliability
services provided by TCP. UDP gives applications a direct interface with IP and
the ability to address a particular application process running on a host via a
port number without setting up a connection session.
A widely used operating system in large networks.
(Uniform Resource Locator) URL is an object on the Internet or an intranet that
resides on a host system. Objects include directories and an assortment of file
types, including text files, graphics, video, and audio. A URL is the address of
an object that is normally typed in the Address field of a Web browser. The URL
is basically a pointer to the location of an object.
Virtual Private Network. These networks use public connections (such as the
Internet) to transfer information. That information is usually encrypted for
security purposes.
Point where a system can be attacked.
Wide Area Network s link geographically dispersed offices in other cities or
around the globe. Just about any long-distance communication medium can
serve as a WAN link, including switched and permanent telephone circuits,
terrestrial radio systems, and satellite systems.
A program that automatically dials phone numbers looking for computers on the
other end. They catalog numbers so that hackers can call back and try to break
in.
A term that describes Pirated Software on the Internet. Warez include cracked
games or other programs that software pirates distribute on the Internet
This is a web-based router (not all) configurator that includes an Internet Access
Wizard, Advanced.
Connecting to a network and monitoring all traffic. Most wire tapping features
can only monitor the traffic on their subnet.
A program that seeks access into other computers. Once a worm penetrates
another computer it continues seeking access to other areas. Worms are often
equipped with dictionary-based password crackers and other cracker tools that
enable them to penetrate more systems. Worms often steal or vandalize
computer data.
A-6000 High Speed, Long Range Ethernet Wireless Bridge
5-7

Advertisement

Table of Contents
loading

Table of Contents