P312 Broadband Security Gateway
ZGlossary
SPAM Unwanted e-mail, usually in the form of advertisements.
Spoofing To forge something, such as an IP address. IP Spoofing is a common way for hackers
to hide their location and identity
SSL (Secured
Socket Layer) Technology that allows you to send information that only the server can read. SSL
allows servers and browsers to encrypt data as they communicate with each other.
This makes it very difficult for third parties to understand the communications.
STP Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two
wires are twisted together to form a pair, and the pair form a balanced circuit. The
twisting prevents interference problems. STP (shielded twisted-pair) provides
protection against external crosstalk.
Straight through
Ethernet cable A cable that wires a pin to its equivalent pin. This cable connects two dissimilar
devices, for example, a data terminal equipment (DTE) device and a data
communications equipment (DCE) device. A straight through Ethernet cable is the
most common cable used.
SUA Single User Account – The Prestige's SUA (Single User Account) feature allows
multiple user Internet access for the cost of a single ISP account - see also NAT.
TCP Transmission Control Protocol handles flow control and packet recovery and IP
providing basic addressing and packet-forwarding services.
Telnet Telnet is the login and terminal emulation protocol common on the Internet and in
UNIX environments. It operates over TCP/IP networks. Its primary function is to allow
users to log into remote host systems.
Tempest Illegal interception of data from computers and video signals.
Terminal A device that allows you to send commands to a computer somewhere else. At a
minimum, this usually means a keyboard and a display screen and some simple
circuitry.
Terminal Software Software that pretends to be (emulates) a physical terminal and allows you to type
commands to a computer somewhere else.
TFTP Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP (File
Transfer Protocol), but it is scaled back in functionality so that it requires fewer
resources to run. TFTP uses the UDP (User Datagram Protocol) rather than TCP
(Transmission Control Protocol).
Trojan or Trojan
Horse Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed
to look innocuous. Yet, when you run the program it installs a virus or memory resident
application that can steal passwords, corrupt data, or provide hackers a back door into
your computer. Trojan applications are particularly dangerous since they can often run
exactly as expected without showing any visible signs of intrusion.
UDP UDP is a connectionless transport service that dispenses with the reliability services
provided by TCP. UDP gives applications a direct interface with IP and the ability to
address a particular application process running on a host via a port number without
setting up a connection session.
UNIX A widely used operating system in large networks.
URL (Uniform Resource Locator) URL is an object on the Internet or an intranet that resides