Prestige 944S Cable Sharing Gateway with 4-port Switch

RIP

Router

SAP

SATAN

Server

Set-Top Box

Shoulder Surfing

SID (Service ID)

SNMP

Snooping

SOCKS

SPAM

Splitter

Spoofing

SSL (Secured Socket Layer)

STP

Straight through

becomes the standard and no further comments or changes are permitted. Change can occur, however, through subsequent RFCs.

Routing Information Protocol is an interior or intra-domain routing protocol that uses the distance-vector routing algorithms. RIP is used on the Internet and is common in the NetWare environment as a method for exchanging routing information between routers.

A device that connects two networks together. Routers monitor, direct, and filter information that passes between these networks. Because of their location, routers are a good place to install traffic or mail filters. Routers are also prone to attacks because they contain a great deal of information about a network.

In NetWare, the SAP (Service Advertising Protocol) broadcasts information about available services on the network that other network devices can listen to. A server sends out SAP messages every 60 seconds. A server also sends out SAP messages to inform other devices that it is closing down. Workstations use SAP to find services they need on the network.

A UNIX program that gathers information on networks and stores it in databases. It is helpful in finding security flaws such as incorrect settings, software bugs and poor policy decisions. It shows network services that are running, the different types of hardware and software on the network, and other information. It was written to help users find security flaws in their network systems.

A computer, or a software package, that provides a specific kind of service to client software running on other computers.

A set-top box is a device that enables a television set to become a user interface to the Internet and also enables a television set to receive and decode digital television (DTV) broadcasts.

Looking over someone's shoulder to see the numbers they dial on a phone, or the information they enter into a computer.

Used in the DOCSIS standard to define a particular mapping between a cable modem (CM) and the CMTS. The SID is used for the purpose of upstream bandwidth allocation and class-of-service management.

System Network Management Protocol is a popular management protocol defined by the Internet community for TCP/IP networks. It is a communication protocol for collecting information from devices on the network.

Passively watching a network for information that could be used to a hacker's advantage, such as passwords. Usually done while Camping Out.

A protocol that handles TCP traffic through proxy servers.

Unwanted e-mail, usually in the form of advertisements.

Passive devices that divide the traffic on trunk cables and send it down feeder cables.

To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide their location and identity

Technology that allows you to send information that only the server can read. SSL allows servers and browsers to encrypt data as they communicate with each other. This makes it very difficult for third parties to understand the communications.

Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are twisted together to form a pair, and the pair form a balanced circuit. The twisting prevents interference problems. STP (shielded twisted-pair) provides protection against external crosstalk.

A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for

L

Glossary

Page 50
Image 50
ZyXEL Communications 964 manual Rip, SAP Satan, Snmp, Socks Spam, Stp