ZyXEL Communications Prestige 964 Guide de l'utilisateur Page 49

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 51
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 48
P964 APR Cable Router with 802.11g Access Point
Glossary K
Upstream
The data flowing from the CM to the CMTS.
Upstream Frequency
The frequency used to transmit data from the CM to the CMTS. Normally in the 5 to 42 MHz
range for US systems and 5 to 65 MHz range for European systems.
URL (Uniform Resource Locator) URL is an object on the Internet or an intranet that resides on a host
system. Objects include directories and an assortment of file types, including text files, graphics,
video, and audio. A URL is the address of an object that is normally typed in the Address field of
a Web browser. The URL is basically a pointer to the location of an object.
VPN Virtual Private Network. These networks use public connections (such as the Internet) to transfer
information. That information is usually encrypted for security purposes.
Vulnerability Point where a system can be attacked.
WA N Wide Area Network s link geographically dispersed offices in other cities or around the globe.
Just about any long-distance communication medium can serve as a WAN link, including
switched and permanent telephone circuits, terrestrial radio systems, and satellite systems.
War Dialer A program that automatically dials phone numbers looking for computers on the other end. They
catalog numbers so that hackers can call back and try to break in.
Warez A term that describes Pirated Software on the Internet. Warez include cracked games or other
programs that software pirates distribute on the Internet
Web Configurator This is a web-based router (not all) configurator that includes an Internet Access Wizard,
Advanced.
Wire Tapping Connecting to a network and monitoring all traffic. Most wire tapping features can only monitor
the traffic on their subnet.
Worm A program that seeks access into other computers. Once a worm penetrates another computer it
continues seeking access to other areas. Worms are often equipped with dictionary-based
password crackers and other cracker tools that enable them to penetrate more systems. Worms
often steal or vandalize computer data.
WWW (World Wide Web) -- Frequently used when referring to "The Internet", WWW has two major
meanings - First, loosely used: the whole constellation of resources that can be accessed using
Gopher, FTP, HTTP, telnet, USENET, WAIS and some other tools. Second, the universe of
hypertext servers (HTTP servers).
Vue de la page 48
1 2 ... 44 45 46 47 48 49 50 51

Commentaires sur ces manuels

Pas de commentaire