ZyXEL Communications P-964 User Manual page 46

Cable router with 11g ap
Table of Contents

Advertisement

P964 APR Cable Sharing Gateway with 4-port Switch
IRC
ISP
LAN
Linux
Logic Bomb
MAC
MCNS
MSO
Name Resolution
NAT
NDIS
NetBIOS
Network
NIC
Node
One-way Cable
Modem
PAC
Packet Filter
PAP
Password Cracker
Password encryption
Password
Shadowing
Penetration
Phreaking
Ping Attack
Pirate
H
Internet Relay Chat. IRC was developed in the late 1980s as a way for multiple users on a system
to "chat" over the network. Today IRC is a very popular way to "talk" in real time with other
people on the Internet. However, IRC is also one avenue hackers use to get information from you
about your system and your company. Moreover, IRC sessions are prone to numerous attacks
that while not dangerous can cause your system to crash.
Internet Service Providers provide connections into the Internet for home users and businesses.
There are local, regional, national, and global ISPs. You can think of local ISPs as the
gatekeepers into the Internet.
Local Area Network is a shared communication system to which many computers are attached. A
LAN, as its name implies, is limited to a local area. This has to do more with the electrical
characteristics of the medium than the fact that many early LANs were designed for departments,
although the latter accurately describes a LAN as well. LANs have different topologies, the most
common being the linear bus and the star configuration.
A version of the UNIX operating system designed to run on IBM Compatible computers.
A virus that only activates itself when certain conditions are met. Logic bombs usually damage
files or cause other serious problems when they are activated.
On a local area network (LAN) or other network, the MAC (Media Access Control) address is
your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet
address.) The MAC layer frames data for transmission over the network, then passes the frame to
the physical layer interface where it is transmitted as a stream of bits.
Multimedia Cable Network System is the consortium behind the DOCSIS standard for cable
modems.
Multiple Service Operators. A cable TV service provider that also provides other services such as
data and/or voice telephony.
The allocation of an IP address to a host name. See DNS
Network Address Translation is the translation of an Internet Protocol address used within one
network to a different IP address known within another network - see also SUA.
Network Driver Interface Specification is a Windows specification for how communication
protocol programs (such as TCP/IP) and network device drivers should communicate with each
other.
Network Basic Input / Output System. NetBIOS is an extension of the DOS BIOS that enables a
PC to connect to and communicate with a LAN.
Any time you connect 2 or more computers together so that they can share resources, you have a
computer network. Connect 2 or more networks together and you have an internet.
Network Interface Card. A board that provides network communication capabilities to and from a
computer system. Also called an adapter.
Any single computer connected to a network
A one-way Cable Modem uses the TV cable for the downstream (receive) and a telephone
modem for upstream (transmit).
The box that calls/answers the phone call and relays the PPP frames to the PNS. A PAC must
have IP and dial-up capability.
A filter that scans packets and decides whether to let them through.
Password Authentication Protocol PAP is a security protocol that requires users to enter a
password before accessing a secure system. The user's name and password are sent over the wire
to a server, where they are compared with a database of user account names and passwords. This
technique is vulnerable to wiretapping (eavesdropping) because the password can be captured
and used by someone to log onto the system.
A program that uses a dictionary of words, phrases, names, etc. to guess a password.
A system of encrypting electronic files using a single key or password. Anyone who knows the
password can decrypt the file.
The encrypted password is no visible in the passwd file but stored in a shadow file that is only
readable by root. This prevents brute force attacks on the encrypted field to guess the password.
see e.g.:
http://whatis.com/shadowpa.htm
Gaining access to computers or networks by bypassing security programs and passwords.
Breaking into phone or other communication systems. Phreaking sites on the Internet are popular
among crackers and other criminals
An attack that slows down the network until it is unusable. The attacker sends a "ping" command
to the network repeatedly to slow it down. See also Denial of Service.
Someone who steals or distributes software without paying the legitimate owner for it. This
category of computer criminal includes several different types of illegal activities Making copies
of software for others to use. Distributing pirated software over the Internet or a Bulletin Board
System. Receiving or downloading illegal copies of software in any form.
Glossary

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prestige 964

Table of Contents