ZyWALL 10 Internet Security Gateway
Pirated Software
Plain Text
ZyWALL Web Configurator
PNS
POP
Port (H/W)
Port
POTS
PPP
PPTP
Promiscuous Packet Capture
Protocol
This category of computer criminal includes several different types of illegal activities Making copies of software for others to use. Distributing pirated software over the Internet or a Bulletin Board System. Receiving or downloading illegal copies of software in any form.
Software that has been illegally copied, or that is being used in violation of the software's licensing agreement. Pirated software is often distributed through pirate bulletin boards or on the Internet. In the internet underground it is known as Warez.
The opposite of Cipher Text, Plain Text is readable by anyone.
This is a
PPTP Network Server. A PNS must have IP connectivity.
Post Office Protocol. This is a common protocol used for sending, receiving, and delivering mail messages.
An interface on a computer for connecting peripherals or devices to the computer. A printer port, for example, is an interface that is designed to have a printer connected to it. Ports can be defined by specific hardware (such as a keyboard port) or through software.
An Internet port refers to a number that is part of a URL, appearing after a colon (:) right after the domain name. Every service on an Internet server listens on a particular port number on that server. Most services have standard port numbers, e.g. Web servers normally listen on port 80.
Plain Old Telephone Service is the analog telephone service that runs over copper
Point to Point Protocol. PPP encapsulates and transmits IP (Internet Protocol) datagrams over serial
Actively capturing packet information from a network. Most computers only collect packets specifically addressed to them. Promiscuous packet capture acquires all network traffic it can regardless of where the packets are addressed.
A “language” for communicating on a network. Protocols are sets of standards or rules used to define, format, and transmit data across a network. There are many different protocols used on networks. For example, most web pages are transmitted using the HTTP protocol.
T | Glossary of Terms |