Prestige 944S Cable Sharing Gateway with 4-port Switch
RIP
Router
SAP
SATAN
Server
Shoulder Surfing
SID (Service ID)
SNMP
Snooping
SOCKS
SPAM
Splitter
Spoofing
SSL (Secured Socket Layer)
STP
Straight through
becomes the standard and no further comments or changes are permitted. Change can occur, however, through subsequent RFCs.
Routing Information Protocol is an interior or
A device that connects two networks together. Routers monitor, direct, and filter information that passes between these networks. Because of their location, routers are a good place to install traffic or mail filters. Routers are also prone to attacks because they contain a great deal of information about a network.
In NetWare, the SAP (Service Advertising Protocol) broadcasts information about available services on the network that other network devices can listen to. A server sends out SAP messages every 60 seconds. A server also sends out SAP messages to inform other devices that it is closing down. Workstations use SAP to find services they need on the network.
A UNIX program that gathers information on networks and stores it in databases. It is helpful in finding security flaws such as incorrect settings, software bugs and poor policy decisions. It shows network services that are running, the different types of hardware and software on the network, and other information. It was written to help users find security flaws in their network systems.
A computer, or a software package, that provides a specific kind of service to client software running on other computers.
A
Looking over someone's shoulder to see the numbers they dial on a phone, or the information they enter into a computer.
Used in the DOCSIS standard to define a particular mapping between a cable modem (CM) and the CMTS. The SID is used for the purpose of upstream bandwidth allocation and
System Network Management Protocol is a popular management protocol defined by the Internet community for TCP/IP networks. It is a communication protocol for collecting information from devices on the network.
Passively watching a network for information that could be used to a hacker's advantage, such as passwords. Usually done while Camping Out.
A protocol that handles TCP traffic through proxy servers.
Unwanted
Passive devices that divide the traffic on trunk cables and send it down feeder cables.
To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide their location and identity
Technology that allows you to send information that only the server can read. SSL allows servers and browsers to encrypt data as they communicate with each other. This makes it very difficult for third parties to understand the communications.
A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for
L | Glossary |