ZyXEL Communications P-964 User Manual page 48

Cable router with 11g ap
Table of Contents

Advertisement

P964 APR Cable Sharing Gateway with 4-port Switch
SATAN
Server
Set-Top Box
Shoulder Surfing
SID (Service ID)
SNMP
Snooping
SOCKS
SPAM
Splitter
Spoofing
SSL (Secured Socket
Layer)
STP
Straight through
Ethernet cable
SUA
Subscriber Unit (SU)
TCP
Telnet
Tempest
Terminal
Terminal Software
TFTP
Three-way Cable
Modem
Trojan or Trojan
Horse
Two-way Cable
Modem
UDP
UNIX
J
messages every 60 seconds. A server also sends out SAP messages to inform other devices that it
is closing down. Workstations use SAP to find services they need on the network.
A UNIX program that gathers information on networks and stores it in databases. It is helpful in
finding security flaws such as incorrect settings, software bugs and poor policy decisions. It
shows network services that are running, the different types of hardware and software on the
network, and other information. It was written to help users find security flaws in their network
systems.
A computer, or a software package, that provides a specific kind of service to client software
running on other computers.
A set-top box is a device that enables a television set to become a user interface to the Internet
and also enables a television set to receive and decode digital television (DTV) broadcasts.
Looking over someone's shoulder to see the numbers they dial on a phone, or the information
they enter into a computer.
Used in the DOCSIS standard to define a particular mapping between a cable modem (CM) and
the CMTS. The SID is used for the purpose of upstream bandwidth allocation and
class-of-service management.
System Network Management Protocol is a popular management protocol defined by the Internet
community for TCP/IP networks. It is a communication protocol for collecting information from
devices on the network.
Passively watching a network for information that could be used to a hacker's advantage, such as
passwords. Usually done while Camping Out.
A protocol that handles TCP traffic through proxy servers.
Unwanted e-mail, usually in the form of advertisements.
Passive devices that divide the traffic on trunk cables and send it down feeder cables.
To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide
their location and identity
Technology that allows you to send information that only the server can read. SSL allows servers
and browsers to encrypt data as they communicate with each other. This makes it very difficult
for third parties to understand the communications.
Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are
twisted together to form a pair, and the pair form a balanced circuit. The twisting prevents
interference problems. STP (shielded twisted-pair) provides protection against external crosstalk.
A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for
example, a data terminal equipment (DTE) device and a data communications equipment (DCE)
device. A straight through Ethernet cable is the most common cable used.
Single User Account – The Prestige's SUA (Single User Account) feature allows multiple user
Internet access for the cost of a single ISP account - see also NAT.
An alternate term for cable modem.
Transmission Control Protocol handles flow control and packet recovery and IP providing basic
addressing and packet-forwarding services.
Telnet is the login and terminal emulation protocol common on the Internet and in UNIX
environments. It operates over TCP/IP networks. Its primary function is to allow users to log into
remote host systems.
Illegal interception of data from computers and video signals.
A device that allows you to send commands to a computer somewhere else. At a minimum, this
usually means a keyboard and a display screen and some simple circuitry.
Software that pretends to be (emulates) a physical terminal and allows you to type commands to
a computer somewhere else.
Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP (File Transfer
Protocol), but it is scaled back in functionality so that it requires fewer resources to run. TFTP
uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol).
A three-way cable modem is a hybrid that can uses either a telephone modem or the TV cable for
the upstream traffic.
Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed to look
innocuous. Yet, when you run the program it installs a virus or memory resident application that
can steal passwords, corrupt data, or provide hackers a back door into your computer. Trojan
applications are particularly dangerous since they can often run exactly as expected without
showing any visible signs of intrusion.
A two-way Cable Modem uses the TV cable for both downstream and upstream traffic.
UDP is a connectionless transport service that dispenses with the reliability services provided by
TCP. UDP gives applications a direct interface with IP and the ability to address a particular
application process running on a host via a port number without setting up a connection session.
A widely used operating system in large networks.
Glossary

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prestige 964

Table of Contents