ZyXEL Communications 964 manual Nic, Pac, Pap, Pns, Pop

Models: 964

1 53
Download 53 pages 45 Kb
Page 48
Image 48

Prestige 944S Cable Sharing Gateway with 4-port Switch

NetBIOS

 

Network Basic Input / Output System. NetBIOS is an extension of the DOS BIOS that enables a

 

 

PC to connect to and communicate with a LAN.

 

 

 

Network

 

Any time you connect 2 or more computers together so that they can share resources, you have a

 

 

computer network. Connect 2 or more networks together and you have an internet.

 

 

 

NIC

 

Network Interface Card. A board that provides network communication capabilities to and from

 

 

a computer system. Also called an adapter.

 

 

 

Node

 

Any single computer connected to a network

 

 

 

One-way Cable

 

A one-way Cable Modem uses the TV cable for the downstream (receive) and a telephone

Modem

 

modem for upstream (transmit).

 

 

 

 

 

 

PAC

 

The box that calls/answers the phone call and relays the PPP frames to the PNS. A PAC must

 

 

have IP and dial-up capability.

 

 

 

Packet Filter

 

A filter that scans packets and decides whether to let them through.

 

 

 

 

 

 

PAP

 

Password Authentication Protocol PAP is a security protocol that requires users to enter a

 

 

password before accessing a secure system. The user’s name and password are sent over the wire

 

 

to a server, where they are compared with a database of user account names and passwords. This

 

 

technique is vulnerable to wiretapping (eavesdropping) because the password can be captured

 

 

and used by someone to log onto the system.

 

 

 

Password Cracker

 

A program that uses a dictionary of words, phrases, names, etc. to guess a password.

 

 

 

Password encryption

 

A system of encrypting electronic files using a single key or password. Anyone who knows the

 

 

password can decrypt the file.

 

 

 

Password

 

The encrypted password is no visible in the passwd file but stored in a shadow file that is only

Shadowing

 

readable by root. This prevents brute force attacks on the encrypted field to guess the password.

 

 

see e.g.: http://whatis.com/shadowpa.htm

 

 

 

Penetration

 

Gaining access to computers or networks by bypassing security programs and passwords.

 

 

 

Phreaking

 

Breaking into phone or other communication systems. Phreaking sites on the Internet are popular

 

 

among crackers and other criminals

 

 

 

Ping Attack

 

An attack that slows down the network until it is unusable. The attacker sends a "ping" command

 

 

to the network repeatedly to slow it down. See also Denial of Service.

 

 

 

Pirate

 

Someone who steals or distributes software without paying the legitimate owner for it. This

 

 

category of computer criminal includes several different types of illegal activities Making copies

 

 

of software for others to use. Distributing pirated software over the Internet or a Bulletin Board

 

 

System. Receiving or downloading illegal copies of software in any form.

 

 

 

Pirated Software

 

Software that has been illegally copied, or that is being used in violation of the software's

 

 

licensing agreement. Pirated software is often distributed through pirate bulletin boards or on the

 

 

Internet. In the internet underground it is known as Warez.

 

 

 

 

 

 

Plain Text

 

The opposite of Cipher Text, Plain Text is readable by anyone.

 

 

 

PNS

 

PPTP Network Server. A PNS must have IP connectivity.

 

 

 

POP

 

Post Office Protocol. This is a common protocol used for sending, receiving, and delivering mail

 

 

messages.

 

 

 

Port

 

An Internet port refers to a number that is part of a URL, appearing after a colon (:) right after

 

 

the domain name. Every service on an Internet server listens on a particular port number on that

 

 

server. Most services have standard port numbers, e.g. Web servers normally listen on port 80.

J

Glossary

Page 48
Image 48
ZyXEL Communications 964 manual Nic, Pac, Pap, Pns, Pop