Prestige 944S Cable Sharing Gateway with 4-port Switch
NetBIOS |
| Network Basic Input / Output System. NetBIOS is an extension of the DOS BIOS that enables a |
|
| PC to connect to and communicate with a LAN. |
|
|
|
Network |
| Any time you connect 2 or more computers together so that they can share resources, you have a |
|
| computer network. Connect 2 or more networks together and you have an internet. |
|
|
|
NIC |
| Network Interface Card. A board that provides network communication capabilities to and from |
|
| a computer system. Also called an adapter. |
|
|
|
Node |
| Any single computer connected to a network |
|
|
|
| A | |
Modem |
| modem for upstream (transmit). |
|
|
|
|
|
|
PAC |
| The box that calls/answers the phone call and relays the PPP frames to the PNS. A PAC must |
|
| have IP and |
|
|
|
Packet Filter |
| A filter that scans packets and decides whether to let them through. |
|
|
|
|
|
|
PAP |
| Password Authentication Protocol PAP is a security protocol that requires users to enter a |
|
| password before accessing a secure system. The user’s name and password are sent over the wire |
|
| to a server, where they are compared with a database of user account names and passwords. This |
|
| technique is vulnerable to wiretapping (eavesdropping) because the password can be captured |
|
| and used by someone to log onto the system. |
|
|
|
Password Cracker |
| A program that uses a dictionary of words, phrases, names, etc. to guess a password. |
|
|
|
Password encryption |
| A system of encrypting electronic files using a single key or password. Anyone who knows the |
|
| password can decrypt the file. |
|
|
|
Password |
| The encrypted password is no visible in the passwd file but stored in a shadow file that is only |
Shadowing |
| readable by root. This prevents brute force attacks on the encrypted field to guess the password. |
|
| see e.g.: http://whatis.com/shadowpa.htm |
|
|
|
Penetration |
| Gaining access to computers or networks by bypassing security programs and passwords. |
|
|
|
Phreaking |
| Breaking into phone or other communication systems. Phreaking sites on the Internet are popular |
|
| among crackers and other criminals |
|
|
|
Ping Attack |
| An attack that slows down the network until it is unusable. The attacker sends a "ping" command |
|
| to the network repeatedly to slow it down. See also Denial of Service. |
|
|
|
Pirate |
| Someone who steals or distributes software without paying the legitimate owner for it. This |
|
| category of computer criminal includes several different types of illegal activities Making copies |
|
| of software for others to use. Distributing pirated software over the Internet or a Bulletin Board |
|
| System. Receiving or downloading illegal copies of software in any form. |
|
|
|
Pirated Software |
| Software that has been illegally copied, or that is being used in violation of the software's |
|
| licensing agreement. Pirated software is often distributed through pirate bulletin boards or on the |
|
| Internet. In the internet underground it is known as Warez. |
|
|
|
|
|
|
Plain Text |
| The opposite of Cipher Text, Plain Text is readable by anyone. |
|
|
|
PNS |
| PPTP Network Server. A PNS must have IP connectivity. |
|
|
|
POP |
| Post Office Protocol. This is a common protocol used for sending, receiving, and delivering mail |
|
| messages. |
|
|
|
Port |
| An Internet port refers to a number that is part of a URL, appearing after a colon (:) right after |
|
| the domain name. Every service on an Internet server listens on a particular port number on that |
|
| server. Most services have standard port numbers, e.g. Web servers normally listen on port 80. |
J | Glossary |