|
|
| Prestige 964 Cable Router | |
|
|
|
|
|
| Ethernet cable | example, a data terminal equipment (DTE) device and a data communications equipment (DCE) | ||
|
|
| device. A straight through Ethernet cable is the most common cable used. |
|
|
|
|
|
|
| SUA |
| Single User Account – The Prestige's SUA (Single User Account) feature allows multiple user |
|
|
|
| Internet access for the cost of a single ISP account - see also NAT. |
|
|
|
|
|
|
| Subscriber Unit (SU) |
| An alternate term for cable modem. | |
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| TCP |
| Transmission Control Protocol handles flow control and packet recovery and IP providing basic | |
|
|
| addressing and |
|
Telnet
Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems.
Tempest |
| Illegal interception of data from computers and video signals. |
|
|
|
Terminal |
| A device that allows you to send commands to a computer somewhere else. At a minimum, this |
|
| usually means a keyboard and a display screen and some simple circuitry. |
|
|
|
Terminal Software |
| Software that pretends to be (emulates) a physical terminal and allows you to type commands to |
|
| a computer somewhere else. |
TFTP
Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP (File Transfer Protocol), but it is scaled back in functionality so that it requires fewer resources to run. TFTP uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol).
Trojan or Trojan Horse
A
Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed to look innocuous. Yet, when you run the program it installs a virus or memory resident application that can steal passwords, corrupt data, or provide hackers a back door into your computer. Trojan applications are particularly dangerous since they can often run exactly as expected without showing any visible signs of intrusion.
| A | |
|
| |
Modem |
|
|
|
|
|
UDP
UNIX
Upstream
Upstream Frequency
UDP is a connectionless transport service that dispenses with the reliability services provided by TCP. UDP gives applications a direct interface with IP and the ability to address a particular application process running on a host via a port number without setting up a connection session.
A widely used operating system in large networks.
The data flowing from the CM to the CMTS.
The frequency used to transmit data from the CM to the CMTS. Normally in the 5 to 42 MHz range for US systems and 5 to 65 MHz range for European systems.
URL
VPN
(Uniform Resource Locator) URL is an object on the Internet or an intranet that resides on a host system. Objects include directories and an assortment of file types, including text files, graphics, video, and audio. A URL is the address of an object that is normally typed in the Address field of a Web browser. The URL is basically a pointer to the location of an object.
Virtual Private Network. These networks use public connections (such as the Internet) to transfer information. That information is usually encrypted for security purposes.
Vulnerability |
| Point where a system can be attacked. |
|
|
|
WAN |
| Wide Area Network s link geographically dispersed offices in other cities or around the globe. |
Glossary | M |