Access Control List (ACL) Access Control List
Access token Access token
Account Lockout account blockade
Account Policies Accounting Policy
Accounts account
Adapter adapter
Adaptive Speed Leveling Adaptive Rate Level Adjustment
Address Resolution Protocol (ARP) address resolution protocol
Administrator Account Administrator account
Arpanet Apa.com (formerly in the Internet)
Algorithm algorithm
Alias alias
Allocation assignment, positioning
Alias applet
ALLOCATION LAYER application layer
API application programming interface
ANLPASSWD A proxy password checker with Passwd
Applications app
ATM asynchronous transmission mode
Attack attack
Audio Policy Trial Strategy
Auditing trial, monitoring
Back-end backend
Borde boundaries
Borde Gateway Boundary Gateway
Breakabie can be broken
BREACH breaks, violates
Cipher password
Ciphertext cps
Class A Domain Class A
Calass B Domain B
Calass C Domain C domain
Classless Addressing Uncocreciated Address Assignment
Cleartext
CSNW NetWare Customer Service
Client customers, clients
Client / Server Client / Server
CODE code
COM Port Com port (Communication port)
CIX service provider
Computer Name computer name
CRACK intrusion
CryptanAlysis password analysis
DLC data link control
Decryption decryption
Database database
Dafault Route default routing
DAFAULT Share
Denial of Service Denied Service
Dictionary Attack Dictionary Attack
Directory directory
Directory Replication Directory Copy
Domain domain
Domain Controller Domain Name Controller
Domain Name domain name
The domain name is actually the name of the network computer, and its role is like the letter needs to be written, the address is as heavy.
want. The domain name structure is as follows: Computer host name. Monkey name. Network name. Supreme layer domain name. Domain name expression, ratio
It is easy to remember with the IP address expressed in digital. Add to Internet-level networks in this network according to DNS naming rules
Computer naming and responsible for completing the conversion of the domain name to the IP address when the communication is completed.
DNS domain name server
DNS (Domain Name System, Domain Name System) refers to a directory service system that queries domain names or IP addresses on the Internet. When receiving the request, it translates the domain name of another host into an IP address, or vice versa. Most domain name
There is a large database, which describes the correspondence between the domain name and the IP address, and this database is
Regularly updated. The translation request usually comes from another computer on the network, which requires an IP address for routing.
DDE dynamic data exchange
DHCP Dynamic Host Configuration Protocol
ENCRYPTION encryption
EGP external gateway protocol
FDDI fiber distributed data interface
FAT file allocation table
FTP (File Transfer Protocol) file transfer protocol
Filter filter
FIRMware firmware
FLOODING drowned
GSNW NetWare Gateway Service
GRAPHICAL Device Interface graphics device interface
GUI graphical user interface
HTML hypertext markup language
HTTP hypertext transfer protocol IGP internal security
ICMP (Internet Control Message Protocol) internet control packet protocol
ICMP is used to send TCP / IP protocols for control and error messages for IP datagram transfer. When an IP datagram cannot be transmitted
When you go to your destination, it may be because of the destination machine suspension service or information traffic blocking, the router may use ICMP
Failure information notification sender.
IGMP (Internet Group Management Protocol, Internet Group Management Agreement)
This TCP / IP protocol allows Internet hosts to participate in multicasting --- a broadcast to computer group
Effective means of information
IIS information server
IP (Internet Protocol) internet protocol
IRC online conversation
ISP network service provider
IPX interconnection network packet protocol
Inter-IPC process communication
IRQ interrupt request
IP Address IP Address
The IP address is called a network protocol address, which is a 32-bit address assigned to the host, which consists of 4 bytes.
Two types of IP addresses and static IP addresses. The dynamic IP address refers to the address obtained by each connection, and quiet
The status IP address refers to an address that is equally fixed each time. Under normal circumstances, the address taken by phone dialing
All are dynamic, that is, each time the address is different.
IP Masquerade IP camouflage
IP spoofing ip spoof
LAN LAN
LPC partial process call
NNTP Network News Transfer Protocol
PPP point to point protocol
Point to point protocol, is to adapt to those who cannot be online
The user communicates with each other by the connection of the telephone line.
PDC main domain controller
Telnet logs in remote
TCP / IP Transmission Control Protocol / Internet Protocol
The TCP / IP communication protocol mainly includes standards of network communication details on the Internet, and a group of network interconnects
Discussion and path selection algorithm. TCP is a transmission control protocol, which is equivalent to the product packing form, ensuring that the data is not in the transmission process.
Will be lost. IP is a network protocol, which is equivalent to the address and name of the delivery, guaranteeing data to the specified location.
TFTP ordinary file transfer protocol
TFTP is a simplified FTP protocol for transferring information for diskless computers. It is very simple, so curable is hard
On the disc, but also supports no authentication. TFTP is a very unsafe protocol.
Trojan Horse Trojan
URL unified resource locator
UDP User Data News Agreement
VDM virtual DOS machine
UUCP is a file transfer protocol based on the use of cats, sometimes using it to transmit on the Internet.
Usenet news and E-mail, especially in those situated sites. Nowadays, there are very few stations to provide anonymous uucp.
Access files. It is a file transfer protocol, only those users who do not use cats without entering the Internet.
WWW World Wide Web
WWW (Word Wide Web) is the latest information service for Internet. It is a kind of hypertext file
Interactive browsing tool. Users can use WWW to browse, pass, and edit files online.
WAN WAN
Virtual Server Virtual Server
Usenet
User AC Network UseNet is the main source of information of the network news server. Usenet is completely civil spontaneous establishment
Using Internet Exchange Information But not fully dependent on the Internet for communication. Use usenet
Voluntary compliance with some agreed network usage rules.
User name user name
User Account User Account
Web Page
OpenGL open graphics language
ODBC open database connection
PCI peripheral connection interface
Authentication certification, identification
Authorization Authorized a package of Back Office Microsoft
Back UP Backup
Backup Browser Reserve Browser
BDC backup domain controller
Baseline baseline
Bios basic input / output system
Binding, collection
Bit bits, binary positions
BootP boot protocol
BGP boot gateway protocol
Bottleneck bottle diameter
Bridge bridge, bridge
Browser browser
Browsing browsing
Channel channel, pathway
CSU / DSU Channel Services Unit / Digital Service Unit
Checksum checksum
Cluster cluster, cluster
CGI public gateway interface
CGI (Common Gateway Interface Public Gateway Interface is a result of the same result or result with user input
Change the program. It can be written in an explanatory interface language, or a programming language for compilation.
write. CGI specifies the interface protocol standard for the web server to call other executable programs. Web server passes CGI
The order implementation and the interaction of the web browser, that is, the CGI program accepts the information sent to the web server to the web browser,
And will send the response results to the web server and web browser. CGI program generally completes the form data in the web page
Processing, database query and implementation of integration with traditional application systems. Although the CGI program can be designed with any programming
Writing language, but CGI programs written in C are characterized by high speed, high security.
CGI-BASED ATTACK (CGI Attack) It uses the fragile point of the public gateway interface, usually with the WWW station
Point
Crash (crash) system suddenly invalid, need to guide from new guidance
CD-ROM read-only CD
Component components
Data Link Data Link
DataGram Data News
Default Document Default Document
Digital Key System Digital Key Control System
Disk mirroring disk mirror
Distributed File System Distributed File System
Data-Driven Attack relies on hidden or encapsulated data, those data can not be perceived.
Through firewall.
DNS Spoofing (Domain Name Server Electronic Deception) attacker is used to harm the domain name server, can be deceived from the high speed of DNS
One way to implement cache or internal attacks (usually the attacker is in a legal DNS server role)
DOS (嘿, no DOS, this is Denad of Service, extremely served) User maliciously uses network information
When the server will refuse to provide services to legitimate users.
EavesDropping to steal, steal
Encrypted tunnel encrypted channel
Enterprise Network Enterprise Network
Ethernet Ethernet
External Security External Security
Environment Variable environment variable
Fax Modem Fax Cat
File Attribute file properties
File System file system
File file
FORM format
FRAGMENTS segmentation
Frame RELAY
FireWall firewall
Firework is one or a set of systems that enhance security between Internet and intranetp (internal network). Fire prevention
The wall can determine which internal services allow external access, which are licensed access to the allowed internal services, and those external services can be
Internal personnel are accessed. In order to make the firewall play a function, all information from and sent to the Internet must be inserted via a firewall.
The firewall only allows authorization information, and the firewall itself cannot be penetrated.
Gated Daemon Gated process (like an early UNIX search service) GATEWAY gateway
Global Account Global Account
Global Group Global Group
Group group
Group Account group account
Group identifier group identifier
HCL hardware compatibility table
Hash scatter
HPFS high performance file system
Home Directory home directory
Home Page Bamboo Leaf
HOP station, relay section
Host host
Hyperlink hypertext link
Highjacking hijacking terminal, that is, captures the control of another user session for an attacker. This
It is rarely that the target security has been destroyed once it happens.
In fact, Netxray did very good at this point.
Htpasswd A system for protecting WWW (UNIX) sites
Icon icon
Impersonation Attack camouflage attack
INDEX Server Index Server
ISA industrial standard structure
InherieTed Rights Filter inheritance
ISDN integrated business digital network
Interactive User Interactive User
Intermediate system intermediary system
INTERNAL Security internal security
Internet Explorer (IE) IBM's World Wide Web Browser
Internet Server Internet Server
Interpreter Interpretation
Intranet intranet, enterprise internal network
Intruder into the invader
IMAP a mail protocol
It is an abbreviation for Internet Message Access Protocal. IMAP provides a hand of managing emails on remote servers
Segment, it is similar to the POP protocol, but the function is more than POP, including: only download the title of the message, build multiple mailboxes and
A folder that saves the mail on the server.
Java Virtual Machine Java Virtual Machine
JavaS cript is a scripting language based on Java language
Jack in a hacker common spoken language, means that the behavior of the server security
KERNEL kernel
Keys key
KeySpace key space
Keystroke Recorder Some uses of some uses of others to steal others username and password
LAN Server LAN server
Local Security Local Security
Log log, record
Logging login
LOGOFF exits, log out
Logical Port logic port
Logon registration
Logon S cript login script
LFN long file name
Logic Bomb (Logic Bomb) A program or code that can cause system lock or fault.
Mass Browser main browser
MAPI
It is an abbreviation for the Messaging Application Progrmming Interface. Microsoft has developed MAPI and some other companies.
Windows applications can be entered into a variety of messages from Microsoft Mail to Novell MHS. However, MAPI
It is limited to work on daily work, ie sense mail applications, which can exchange emails and data on the network.
MEMBER Server member server
Menu menu
Message message
MultiLink multi-link
MIME Multimedia Internet Mail Extension
MPR multi-protocol router
Multiprocessing multiple processing
Module module
Multihomed host multi-point host
Mud
MUD's English full name is Multiple User Dimension, Multiple User Dialogue or
Multiple User Dungeon, translated as "Multi-person World", "Multi-person Dialogue" or "Multi-person Dungeon", commonly known as "mud" game.
Named pipes named pipe
NDS NetWare directory service
NetBeui NetBIOS extended user interface
NetBIOS Gateway NetBIOS Gateway
NetWare network operating system (I am sorry, I forgot is the company developed)
NetWork network
NetBIOS Network Basic Input / Output System
NDIS network driver interface specification
NetDDE network dynamic data exchange
NIC network interface card
Network Layer Network Layer
NetWork Monitor A Network Monitor
Network Operating System Network Operating System
Network printer network printer
Network security network security
Network user network users
NFS network file system
Node node
NPASSWD UNIX a proxy password checker, which will filter potential passwords before committing to password files.
OSPF Open Shortest Path Priority Agreement
OSI MODEL Open System Interconnect Mode
Out-of-band attack
Packet Filter packet filter
Password password
Path path
PayLoad Net Load
PBX special switch
PCS Personal Communication Business
Peer peer
Permission permissions
Plaintext
PPTP point to point tunnel protocol
Port port
Prority priority
Protocol protocol
Potential Browser Potential Browser
POP Internet email protocol standard
It is the abbreviation of Post Office Protocol and is the Internet email protocol standard. We can have POP
Host Transport and Receive Emails of Service Features. The deficiencies of the agreement are that when you receive an email, all
The letters are cleared from the server and download to your local hard drive. Of course, there are some client programs to
Submail remains on the server or set to more than a certain size file is not available. With multimedia
Format, email will get more and more, we hope to be able to download what files download, when to download, this needs
IMAP protocol. The current version of POP is POP3.
Process process
Proxy agent
Proxy Server Agent Server
Agent service is the agent web user to obtain information, usually use WWW software to connect the end of the remote terminal
When the material is expected, the request signal must be sent and then the transfer of one byte of one byte is back. After the setting of Proxy,
Signal signals will be sent to Proxy Server. When Proxy Server gets the user's request, you will first go to Cache.
Looking for the same information, if there is, you will pass the information directly to the user by Proxy Server, if cache is not
There are information, Proxy Server will use the bandwidth you can use on the network, to retrieve the information on the remote station, while
In Cache, it is transmitted to the user. Even if the line is blocked, it is still more fast than the user yourself.
Paseudorandom pseudo-random
phreaking means the process of controlling the telephone system
RAS Remote Access Service
Remote Control Remote Control
RPC remote process call
Remote boot Remote Boot
Route routing
Router router
Routing routing
RIP routing information protocol
ROUTED DAEMON a Unix Diagnosis Services with RIP
Routing Table Routing Table
R.U.P Routing Update Protocol
RSA A common key encryption algorithm. RSA may be the most popular.
s cript script
SEARCH ENGINE Search Engine SSL Socket Layer
Secure password
SID security identifier
Sender sender
SLIP Serial Line Network Agreement
Server server
Server-based network server-based network
Session Layer Conference Layer
Share, Sharing Sharing
Share-Level Security shared level security
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Agreement
Site site
SCSI Small Computer System Interface
SNFFER error detector
Snooping
Standalone Server Independent Server
STRONG CIPHER strong password
Stream Cipher stream password
Strong Password strength
SQL structured query language
Subnet Mask subnet mask
Subdirectory subdirectory
Subnet
SWAP file exchange file
SACL System Access Control Table
S / KEY Safety Connection Disposable Password System, in S / Key, the password will never be transmitted through the network, so it is impossible to be stealing.
Sniffer Secret captures the program of data packets through the network, hackers typically use it to try to steal the username and password.
Spoofing (Electronic Spoof) Any process involving false dressed users or hosts to unauthorized access to the goals
Time Bomb (Time Bomb) refers to a program that waits for a specific time or event first, causing a machine failure.
TCPDump is a utility that captures a packet in UNIX, which is often used to obtain detailed network communication records.
Traceroute A common TCP program on a Unix, generic tracking between local and remote hosts
T0, DS0 56 or 64kbps
T1, DS1 24 PCM digital, total rate is 1.544Mbps
T3, DS3 28 T1 channels, the work can be 44.736Mbps
Thin Client thin client
Thread thread
THROUGHPUT throughput
TRANSPORT LAYER transmission
Transport Protocol Transfer Protocol
Trust Trust
Tunnel security encrypted link
Vector of attack attack vector
Virtual Directory false
Virtual Machine Virtual Machine
VRML Virtual Reality Model Language
Volume file set
Vulnerability vulnerability
WEAK Passwurd Weak Call
Well-KNown Ports Universal Port
Workstation workstation
X.25 a packet switching network protocol
ZONE TRANSFER Region Conversion