ZyWALL 10 Internet Security Gateway

Server

Shoulder Surfing

SNMP

Snooping

SOCKS

SPAM

Spoofing

SSL (Secured Socket Layer)

STP

Straight through Ethernet cable

SUA

TCP

Telnet

Tempest

Terminal

Terminal Software

security flaws in their network systems.

A computer, or a software package, that provides a specific kind of service to client software running on other computers.

Looking over someone's shoulder to see the numbers they dial on a phone, or the information they enter into a computer.

System Network Management Protocol is a popular management protocol defined by the Internet community for TCP/IP networks. It is a communication protocol for collecting information from devices on the network.

Passively watching a network for information that could be used to a hacker's advantage, such as passwords. Usually done while Camping Out.

A protocol that handles TCP traffic through proxy servers.

Unwanted e-mail, usually in the form of advertisements.

To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide their location and identity

Technology that allows you to send information that only the server can read. SSL allows servers and browsers to encrypt data as they communicate with each other. This makes it very difficult for third parties to understand the communications.

Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are twisted together to form a pair, and the pair form a balanced circuit. The twisting prevents interference problems. STP (shielded twisted-pair) provides protection against external crosstalk.

A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for example, a data terminal equipment (DTE) device and a data communications equipment (DCE) device. A straight through Ethernet cable is the most common cable used.

Single User Account – The ZyWALL's SUA (Single User Account) feature allows multiple user Internet access for the cost of a single ISP account - see also NAT.

Transmission Control Protocol handles flow control and packet recovery and IP providing basic addressing and packet-forwarding services.

Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems.

Illegal interception of data from computers and video signals.

A device that allows you to send commands to a computer somewhere else. At a minimum, this usually means a keyboard and a display screen and some simple circuitry.

Software that pretends to be (emulates) a physical terminal and allows you to type commands to a computer somewhere else.

V

Glossary of Terms