| ZyAIR 100 Wireless PC Card |
|
|
| install traffic or mail filters. Routers are also prone to attacks because they contain a great deal |
| of information about a network. |
RTS Threshold | Transmitter contending for the medium may not hear each other. RTS/CTS mechanism can |
| solve this “Hidden Node Problem.” If the packet size is smaller than the preset RTS |
| Threshold size, the RTS/CTS mechanism will not be enabled. |
Server | A computer, or a software package, that provides a specific kind of service to client software |
| running on other computers. |
Service Set | The SSID indicates the identity of an ESS or IBSS. |
Identifier (SSID) |
|
Snooping | Passively watching a network for information that could be used to a hacker’s advantage, such |
| as passwords. Usually done while Camping Out. |
SPAM | Unwanted email, usually in the form of advertisements. |
SSL (Secured | Technology that allows you to send information that only the server can read. SSL allows |
Socket Layer) | servers and browsers to encrypt data as they communicate with each other. This makes it very |
| difficult for third parties to understand the communications. |
Station (STA) | Any device that contains an IEEE 802.11 conformant medium access control (MAC) and |
| physical layer (PHY) interface to the wireless medium (WM). |
Telnet | Telnet is the login and terminal emulation protocol common on the Internet and in UNIX |
| environments. It operates over TCP/IP networks. Its primary function is to allow users to log |
| into remote host systems. |
Terminal | A device that allows you to send commands to a computer somewhere else. At a minimum, |
| this usually means a keyboard and a display screen and some simple circuitry. |
Terminal | Software that pretends to be (emulates) a physical terminal and allows you to type commands |
Emulation | to a computer somewhere else. |
Software |
|
UNIX | A |
URL | (Uniform Resource Locator) URL is an object on the Internet or an intranet that resides on a |
| host system. Objects include directories and an assortment of file types, including text files, |
| graphics, video and audio. A URL is the address of an object that is normally typed in the |
| Address field of a web browser. The URL is basically a pointer to the location of an object. |
VPN | Virtual Private Network. These networks use public connections (such as the Internet) to |
| transfer information. That information is usually encrypted for security purposes. |
Vulnerability | Point where a system can be attacked. |
WAN | Wide Area Networks link geographically dispersed offices in other cities or around the globe. |
| Just about any |
| switched and permanent telephone circuits, terrestrial radio systems and satellite systems. |
Wired | The optional cryptographic confidentiality algorithm specified by IEEE 802.11 used to |
Equivalent | provide data confidentiality that is subjectively equivalent to the confidentiality of a wired |
Privacy (WEP) | local area network (LAN) medium that does not employ cryptographic techniques to enhance |
| privacy. |
Glossary | K |