Access Control List (ACL) Access Control List
Access Token
Account Lockout account Blocking
Account Policies Accounting Policy
Accounts account
Adapter
Adaptive speed leveling adaptive speed level adjustment
Address Resolution Protocol (ARP) Address Resolution Protocol
Administrator Account
Arpanet Apache (predecessor of the Internet)
Algorithm Algorithm
Alias alias
Allocation allocation and positioning
Alias small Application Program
Allocation layer application layer
API Application Programming Interface
Anlpasswd is a proxy password checker similar to passwd +.
Applications
ATM asynchronous transmission mode
Attack
Audio policy Audit Policy
Auditing review and monitoring
Back-end backend
Borde Boundary
Borde Gateway
Breakabie can break passwords
Breach attack and Violation
Cipher Password
Ciphertext
Calass a domain a class domain
Calass B Domain B class domain
Calass C domain C Class domain
Classless addressing classless Address Allocation
Cleartext plaintext
Csnw Netware Customer Service
Client customer, client
Client/Server
Code Code
COM port comport (Communication Port)
CIX service provider
Computer name
Crack intrusion
Cryptanalysis password Analysis
DLC Data Link Control
Decryption
Database
Dafault route default route
Dafault share default share
Denial of Service
Dictionary attack
Directory
Directory Replication
Domain domain
Domain Controller domain name Controller
Domain Name
A domain name is actually the name of a computer that is connected to the Internet. It serves as a message that requires people's names and addresses.
Yes. The domain name structure is as follows: Host Name of the computer. organization name. Network Name. top-level domain name. Domain names are expressed in text.
IP addresses expressed in numbers are easy to remember. All levels of networks connected to the internet follow the naming rules of DNS.
And is responsible for converting the domain name to the IP address during communication.
DNS Server
Domain Name System (DNS) refers to the directory service system that queries the domain name or IP address on the Internet.
System. When receiving a request, it can translate the domain name of another host into an IP address or vice versa. Most domain names
All maintain a large database, which describes the correspondence between domain names and IP addresses, and the database is
Update regularly. A translation request is usually sent from another computer on the network. It requires an IP address for route selection.
Dynamic DDE data exchange
DHCP Dynamic Host Configuration Protocol
Encryption
EGP external Gateway Protocol
FDDI Optical Fiber Distributed Data Interface
FAT file allocation table
File Transfer Protocol (FTP)
Filter
Firmware firmware
Flooding
Gsnw Netware gateway service
GDI (graphical device interface) Graphical Device Interface
Gui
HTML Hypertext Markup Language
HTTP Hypertext Transfer Protocol
IGP Internal Security
Internet Control Message Protocol (ICMP)
The TCP/IP protocol used to send control and error messages about IP datagram transmission. When an IP datagram cannot be transmitted
To the destination, it may be because the destination machine is suspended or the information traffic is blocked. The router may use ICMP
Notify the sender of the failure message.
IGMP (Internet Group Management Protocol, Internet Group Management Protocol)
This TCP/IP protocol allows Internet hosts to participate in multi-point broadcast (multicasting)-a type of broadcast to a computer group
Effective means of information
IIS Information Server
IP (Internet Protocol) Internet Protocol
IRC online chat
ISP network service provider
IPX Internet connection group protocol
IPC inter-process communication
IRQ interrupt request
IP address
An IP address is a 32-bit IP address assigned to the host. It consists of 4 bytes and is divided into dynamic
Static IP addresses. Dynamic IP addresses refer to different addresses obtained by each connection, but static IP addresses
The status IP address is the same fixed address for each connection. Generally, the address obtained by dialing
All are dynamic, that is, the obtained address is different each time.
IP masquerade IP camouflage
IP spoofing IP Spoofing
Lan
LPC local process call
NNTP Network News Transfer Protocol
PPP Point-to-Point Protocol
The Point to Point protocol is used to adapt
The protocol established by the user to communicate with each other through telephone lines.
PDC Primary Domain Controller
Telnet Remote Login
TCP/IP Transmission Control Protocol/Internet Protocol
TCP/IP communication protocols mainly include the standards of network communication details on the Internet, and a group of network interconnection protocols.
And the path selection algorithm. TCP is a transmission control protocol, which is equivalent to an item packing list to ensure that data is not transmitted during transmission.
Will be lost. The IP address is an inter-network protocol, which is equivalent to the address and name of the recipient and ensures that the data arrives at the specified location.
TFTP Common File Transfer Protocol
TFTP is a simplified FTP protocol used by diskless computers to transmit information. It is very simple, so it can be solidified in hard
Disks, and supports non-authenticated operations. TFTP is a very insecure protocol.
Troj an horse Trojan Horse
Uniform URL Resource Locator
UDP User Datagram Protocol
Vdm Virtual DOS host
UUCP is a cat-based file transfer protocol that has been in use for a long time.
Usenet news and E-mail, especially on disconnected websites. Few websites now provide anonymous uucp
Access a file. It is a File Transfer Protocol, which is used only by users who do not access the network and use the cat.
WWW
WWW (Word Wide Web) is the latest Internet Information Service. It is a type of hypertext file-based
Interactive browser retrieval tool. You can use WWW to browse, transmit, and edit files in hypertext format on the Internet.
Wan
Virtual Server
Usenet
Usenet is the main information source of the network news server. Usenet is completely a private spontaneous Establishment
User communication networks that use the Internet to exchange information but do not fully rely on the Internet for communication. Use Usenet
Volunteers observe the agreed network usage rules.
User Name
User Account
Web Page
OpenGL open Graphics Language
ODBC open data connectivity
PCI peripheral connection interface
Authentication and authentication
Authorization authorization
A Software Package for back office Microsoft
Back up backup
Backup Browser
BDC backup Domain Controller
Baseline
BiOS Basic Input/Output System
Binding Association and collection
Bit bit and binary bit
BOOTP Boot Protocol
BGP guiding Gateway Protocol
Bottleneck bottle diameter
Bridge and bridge
Browser
Browses browsing
Channel channels and channels
CSU/DSU channel service unit/digital service unit
Checksum checksum
Cluster clusters and clusters
CGI public Gateway Interface
CGI (Common Gateway Interface) is a public gateway interface that can generate the same results or results with user input.
And the changed program. It can be written in an explanatory interface language or compiled Programming Language
Write. CGI specifies the interface protocol standard for the Web server to call other executable programs. The Web server calls the CGI program
The CGI program receives the information sent from the web browser to the web server.
And then send the response to the Web server and Web browser. CGI programs generally complete the form data in Web pages
Processing, database query, and integration with traditional application systems. CGI programs can be designed using any program.
The CGI program written in C language has the features of fast execution speed and high security.
CGI-based attack (CGI-based attack), which uses the vulnerability of the public gateway interface to attack, usually through the WWW site
Click
The crash (crash) system suddenly becomes invalid and requires a new boot.
CD-ROM read-only Disc
Component component
Data Link
Datasync Datagram
Default default document
Digital key system digital keying System
Disk Mirroring
Distributed File System
Data-driven attack (data-driven attacks) relies on attacks that hide or encapsulate data, and the data is invisible.
Through the firewall.
DNS spoofing (Domain Name Server electronic spoofing) attackers can exploit this vulnerability to damage the Domain Name Server.
Cache or internal attacks (generally, attackers pretend to be legitimate DNS server roles)
DOS (hey, it's not dos, it's deniad of service, it's extremely DoS) The user maliciously uses the Network Information Server
The server will refuse to provide services to legal users.
Eavesdropping eavesdropping and theft
Encrypted tunnel encryption Channel
Enterprise Network
Ethernet
External Security external security
Environment variable
Fax modem Modem
File Attribute
File System
File
Form Format
Fragments Segmentation
Frame Relay slave Relay
Firewall
Firework (firewall) is one or more systems that enhance security protection between the Internet and intranetp (Intranet. Fire Prevention
The wall can determine which internal services allow external access, which outsiders are permitted to access the internal services that are allowed
Internal staff access. To make the firewall effective, all information from and sent to the Internet must go through the firewall.
The firewall only allows authorization information to pass through, and the firewall itself cannot be infiltrated.
Gated daemon gated process (like an early UNIX path-finding Service)
Gateway
Global Account
Global Group
Group
Group account
Group Identifier
HCl hardware compatibility table
Hash hash table
HPFs High-Performance File System
Home Directory
Home Page bamboo
Hop station and relay segment
Host host
Hyperlink
The highj ACKing hijacking terminal allows attackers to capture the control of another user session. This
Is rare. Once it occurs, it indicates that the security of the target has been damaged.
In fact, netxray is doing well at this point.
Htpasswd is a system that uses a password to protect websites on WWW (UNIX ).
Icon
Impersonation attack
Index Server
ISA industrial standard structure
Inherieted rights filter inherits permission Filters
ISDN Integrated Service Digital Network
Interactive User
Intermediate System
Internal Security
Internet Explorer (IE) IBM Web Browser
Internet Server
Interpreter
Intranet, enterprise intranet
Intruder intrusion
IMAP is a mail protocol.
Internet Message Access protocal. IMAP provides a remote server for mail management.
It is similar to the POP protocol, but has more features than pop. features include: only download the mail title, create multiple mailboxes, and
Create a folder for saving emails on the server.
J Ava Virtual Machine J Ava Virtual Machine
J Ava is a scripting language based on J Ava.
J ack in is a common spoken language used by hackers, which means cracking server security.
Kernel
Keys key
Keyspace
Keystroke recorder (Key recorder) tools used to steal others' user names and passwords
LAN server
Local Security local security
Log and record
Logging Logon
Logoff logout
Logical Port
Logon Registration
Logon logon script
LFN long file name
Logic bomb (logical bomb) is a program or code that can cause a system lock or failure.
Mass browser main browser
Mapi
Is the abbreviation of messaging application progrmming interface. Microsoft and other companies have developed mapis,
Allows Windows applications to access multiple messaging systems from Microsoft Mail to Novell MHS. However, mapi
Only works at the level of daily work, that is, the application that perceives mail. It can exchange mail and data on the network.
Member Server
Menu
Message
Multilink multi-Link
Mime multimedia Internet Mail Extension
Multi-Protocol
Multiprocessing
Module
Multihomed host multi-point host
Mud
The full name of mud is multiple user dimension, multiple user dialogue or
Multiple User dungeon, translated as "multiplayer world", "multiplayer conversation", or "multiplayer dungeon ",
It is also known as the "mud" game.
Named Pipes Named Pipe
NDS Netware Directory Service
Netbeui NetBIOS extension user interface
NetBIOS Gateway
Netware network operating system (Sorry, I forgot it was developed by that company)
Network
NetBIOS network Basic Input/Output System
NDIS Network Driver Interface Specification
NetDDE Dynamic Data Exchange
Nic network interface card
Network Layer
Network Monitor a network monitor program
Network Operating System
Network Printer
Network Security
Network user
NFS Network File System
Node
Npasswd UNIX is a proxy password Checker that filters potential passwords before being submitted to the password file.
OSPF Open Shortest Path Priority Protocol
OSI model Open System Interconnection Mode
Out-of-band attack
Packet Filter grouping Filter
Password
Path
Payload
PBX vswitch
PCS Personal Communication Service
Peer peer
Permission permission
Plaintext plaintext
PPTP Point-to-Point Tunneling Protocol
Port
Prority priority
Protocol
Potential browser potential Browser
Pop Internet email protocol standard
Is the abbreviation of Post Office Protocol, which is the internet email protocol standard. We can use Pop
The host of the service function to send and receive emails. The disadvantage of this protocol is that when you receive an email, all
All emails are cleared from the server and downloaded to your local disk. Of course, some client programs can
The sub-email is left on the server or cannot be downloaded if it is set to a file larger than a certain size. With the use of multimedia
Formats and emails will become larger and larger. We hope to have a flexible understanding of what files to download and when to download.
Imap protocol. The current POP version is POP3.
Process
Proxy
Proxy Server
A proxy service is used by a Web user to obtain information. Generally, WWW software is used to connect remote terminals to obtain information.
The request signal must be sent, and then one byte or one byte must be sent back. With the proxy settings
The data retrieval signal is sent to the proxy server first. When the proxy server receives a user request, it first goes to the cache
To find the same information. If yes, the proxy server directly transmits the information to the user.
With information available, the proxy server uses the bandwidth available on the network to retrieve data from the remote platform and store the data.
In the cache, one side is transferred to the user. Even if the line is blocked, it is faster than directly capturing it by the user.
Paseudorandom pseudo-random
Phreaking refers to the process of controlling the telephone system
RAS remote access service
Remote Control
RPC Remote Procedure Call
Remote Boot
Route route
Router
Routing Route Selection
Rip route selection Information Protocol
Routed daemon is a UNIX path-finding service that uses rip.
Routing table route table
R. u. p route update protocol
RSA is a public key encryption algorithm. RSA is perhaps the most popular.
Script
Search Engine
SSL Secure Sockets Layer
Secure Password
Sid Security Identifier
Sender sender
Slip Serial Line Internet Protocol
Server
Server-based network server-based network
Session Layer
Share and sharing
Share-level security shared-level security
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
Site
SCSI small computer system interface
Snffer
Snooping
Standalone server independent server
Strong strong cipher Password
Stream cipher stream Password
Strong Password
Structured SQL Query Language
Subnet Mask
Subdirectory
Subnet
Swap file swap file
SACL system access control table
S/key secure connection is a one-time password system. In S/key, passwords are never sent over the network, so they cannot be stolen.
The sniffer program secretly captures data packets passing through the network. Hackers generally use it to steal user names and passwords.
Spoofing (Electronic spoofing) Any process involving impersonating other users or hosts for unauthorized access to the target
Time Bomb (time bomb) refers to a program that waits for a specific timer or event to be activated first, leading to machine failure.
Tcpdump is a practical tool for capturing data packets in Unix. It is often used to obtain detailed network communication records.
Traceroute is a common TCP program on Unix. It is used to track routes between the local host and remote host.
T0, ds0 56 or 64 Kbps
T1, ds1 24 PCM Digital calls, total rate of 1.544 Mbps
T3, DS3 28 T1 channels, works at 44.736 Mbps
Thin client
Thread
Throughput
Transport Layer Transfer volume
Transport Protocol Transfer Protocol
Trust
Tunnel secure encryption Link
Vector of attack vector
Virtual directory
Virtual Machine (VM)
Virtual Reality Model language
Volume file set
Vulnerability
Weak Password
Well-known ports
Workstation
X.25 A Packet Exchange Network Protocol
Zone Transfer Region Conversion