ZyAIR 100 Wireless PC Card

 

 

 

install traffic or mail filters. Routers are also prone to attacks because they contain a great deal

 

of information about a network.

RTS Threshold

Transmitter contending for the medium may not hear each other. RTS/CTS mechanism can

 

solve this “Hidden Node Problem.” If the packet size is smaller than the preset RTS

 

Threshold size, the RTS/CTS mechanism will not be enabled.

Server

A computer, or a software package, that provides a specific kind of service to client software

 

running on other computers.

Service Set

The SSID indicates the identity of an ESS or IBSS.

Identifier (SSID)

 

Snooping

Passively watching a network for information that could be used to a hacker’s advantage, such

 

as passwords. Usually done while Camping Out.

SPAM

Unwanted email, usually in the form of advertisements.

SSL (Secured

Technology that allows you to send information that only the server can read. SSL allows

Socket Layer)

servers and browsers to encrypt data as they communicate with each other. This makes it very

 

difficult for third parties to understand the communications.

Station (STA)

Any device that contains an IEEE 802.11 conformant medium access control (MAC) and

 

physical layer (PHY) interface to the wireless medium (WM).

Telnet

Telnet is the login and terminal emulation protocol common on the Internet and in UNIX

 

environments. It operates over TCP/IP networks. Its primary function is to allow users to log

 

into remote host systems.

Terminal

A device that allows you to send commands to a computer somewhere else. At a minimum,

 

this usually means a keyboard and a display screen and some simple circuitry.

Terminal

Software that pretends to be (emulates) a physical terminal and allows you to type commands

Emulation

to a computer somewhere else.

Software

 

UNIX

A widely-used operating system in large networks.

URL

(Uniform Resource Locator) URL is an object on the Internet or an intranet that resides on a

 

host system. Objects include directories and an assortment of file types, including text files,

 

graphics, video and audio. A URL is the address of an object that is normally typed in the

 

Address field of a web browser. The URL is basically a pointer to the location of an object.

VPN

Virtual Private Network. These networks use public connections (such as the Internet) to

 

transfer information. That information is usually encrypted for security purposes.

Vulnerability

Point where a system can be attacked.

WAN

Wide Area Networks link geographically dispersed offices in other cities or around the globe.

 

Just about any long-distance communication medium can serve as a WAN link, including

 

switched and permanent telephone circuits, terrestrial radio systems and satellite systems.

Wired

The optional cryptographic confidentiality algorithm specified by IEEE 802.11 used to

Equivalent

provide data confidentiality that is subjectively equivalent to the confidentiality of a wired

Privacy (WEP)

local area network (LAN) medium that does not employ cryptographic techniques to enhance

 

privacy.

Glossary

K

Page 64
Image 64
ZyXEL Communications 100 manual Spam, Unix, Url, Vpn, Wan