P312 Broadband Security Gateway

SPAM

Spoofing

SSL (Secured Socket Layer)

STP

Straight through Ethernet cable

SUA

TCP

Telnet

Tempest

Terminal

Terminal Software

TFTP

Trojan or Trojan Horse

UDP

UNIX

URL

Unwanted e-mail, usually in the form of advertisements.

To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide their location and identity

Technology that allows you to send information that only the server can read. SSL allows servers and browsers to encrypt data as they communicate with each other. This makes it very difficult for third parties to understand the communications.

Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are twisted together to form a pair, and the pair form a balanced circuit. The twisting prevents interference problems. STP (shielded twisted-pair) provides protection against external crosstalk.

A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for example, a data terminal equipment (DTE) device and a data communications equipment (DCE) device. A straight through Ethernet cable is the most common cable used.

Single User Account – The Prestige's SUA (Single User Account) feature allows multiple user Internet access for the cost of a single ISP account - see also NAT.

Transmission Control Protocol handles flow control and packet recovery and IP providing basic addressing and packet-forwarding services.

Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems.

Illegal interception of data from computers and video signals.

A device that allows you to send commands to a computer somewhere else. At a minimum, this usually means a keyboard and a display screen and some simple circuitry.

Software that pretends to be (emulates) a physical terminal and allows you to type commands to a computer somewhere else.

Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP (File Transfer Protocol), but it is scaled back in functionality so that it requires fewer resources to run. TFTP uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol).

Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed to look innocuous. Yet, when you run the program it installs a virus or memory resident application that can steal passwords, corrupt data, or provide hackers a back door into your computer. Trojan applications are particularly dangerous since they can often run exactly as expected without showing any visible signs of intrusion.

UDP is a connectionless transport service that dispenses with the reliability services provided by TCP. UDP gives applications a direct interface with IP and the ability to address a particular application process running on a host via a port number without setting up a connection session.

A widely used operating system in large networks.

(Uniform Resource Locator) URL is an object on the Internet or an intranet that resides

Z

Glossary

Page 247
Image 247
ZyXEL Communications P-312 manual Spam, Stp, Sua Tcp, Tftp, UDP Unix URL