Network Security Professional Vocabulary _ Chinese and English

Source: Internet
Author: User
Tags hash imap domain name server file transfer protocol ftp protocol microsoft mail strong password dns spoofing
Access Controls list (ACL) access control lists
Access token accessing token
Account Lockout accounts lockout
Account Policies Accounting Policy
Accounts account number
Adapter Adapter
Adaptive speed leveling adaptive rate level adjustment
Addressing resolution Protocol (ARP) Address Resolution Protocol
Administrator account
ARPANET (predecessor of the Internet)
Algorithm algorithm
Alias aliases
Allocation distribution, positioning
Alias Small Application
Allocation Layer Application Layer
API Application Programming Interface
ANLPASSWD a proxy password checker similar to passwd+
Applications applications
ATM Asynchronous Delivery Mode
Attack attack
The Audio policy examination Strategy
Auditing Examination and supervision
Back-end back end
Borde border
Borde Gateway Boundary Gateways
Breakabie can be broken.
Breach breached, violated
cipher password
Ciphertext cipher
Calass a Domain A class
Calass b Domain B class
Calass C domain C class
Classless addressing no class address assignment
Cleartext plaintext
CSNW NetWare Customer Service
Client clients, clients
Client/server Client/server
Code codes
COM port COM port (communication ports)
CIX Service Provider
Computer name Computer name
Crack broke into
cryptanalysis Password Analysis
DLC Data Link Control
Decryption decryption
Database databases
Dafault Route default route
Dafault share Default Share
Denial of service denial
Dictionary-Attack Dictionary attack
Directory directories
Directory Replication Catalog replication
Domain domains
Domain controller name Controller
Domain name Name
Domain name is actually the name of the network computer, its role is like the letter need to write people's name, address as important. The domain name structure is as follows: The computer host name, the name of the organization, the network name, the top-level domain name. The domain name is expressed in words, which is easier to remember than the IP address with digital expression. Internet-level networks name the computers in the network according to DNS naming rules, and are responsible for the conversion of domain names to IP addresses when the communication is completed.
DNS Domain Name server
DNS (Domain Name System, field name systems) refers to the directory service system that queries the domain name or IP address on the Internet. When a request is received, it can translate the domain name of another host to an IP address, or vice versa. Most domain name systems maintain a large database that describes the correspondence between domain names and IP addresses, and the database is updated periodically. Translation requests typically come from another computer on the network that requires an IP address for routing.
DDE Dynamic Data exchange
DHCP Dynamic Host Configuration Protocol
Encryption encryption
EGP External Gateway Protocol
FDDI Fiber Distributed Data Interface
FAT file Allocation table
FTP (File Transfer Protocol) FTP
Filter filters
Firmware firmware
Flooding submerged
GSNW NetWare Gateway Service
GDI (Graphical device interface) graphics device interface
GUI Graphical user interface
HTML Hypertext Markup Language
HTTP Hypertext Transfer Protocol
IGP Internal Security
ICMP (Internet Control Message Protocol) Internetwork Protocol
The TCP/IP protocol used by ICMP to send control and error messages about the transmission of IP datagrams. When an IP datagram is not delivered
When you arrive at your destination, it may be because the machine on the destination is paused or information traffic is blocked, and the router may use ICMP to
The failure message notifies the sender.
IGMP (Internet Group Management protocol,internet Group Management Protocol)
This TCP/IP protocol allows Internet hosts to participate in multiple-demand delivery (multicasting)----a broadcast to a computer group
Effective means of information
IIS Information Server
IP (Internet Protocol) Internet Protocol
IRC Online Chat
ISP Network Service Provider
IPX Internet Packet Protocol
IPC interprocess Communication
IRQ Interrupt Request
IP Address IP addresses
An IP address, called a network protocol address, is a 32-bit address assigned to a host, consisting of 4 bytes, divided into moving
State IP address and static IP address two kinds. A dynamic IP address is a different address for each connection, and static
The state IP address is the same fixed address for each connection. In general, the address obtained by dialing by telephone
Are dynamic, that is, each time you get a different address.
IP Masquerade IP Camouflage
IP Spoofing IP Spoofing
LAN LAN
LPC Local Procedure Call
NNTP Network News Transfer Protocol
PPP Point-to-Point Protocol
The Point-to-Point Communication protocol (point to Point Protocol) is a protocol that is designed to accommodate those who cannot communicate with each other on a network line by connecting to one another over a telephone line.
PDC Master domain Controller
Telnet Remote Login
TCP/IP Transmission Control Protocol/Internet Protocol
TCP/IP communication protocol mainly includes the standard of network communication in Internet, and a set of protocols and path selection algorithms for network interconnection. TCP is the Transmission Control protocol, which is equivalent to the Item packing list, ensuring that the data is not lost during transmission. IP is a network protocol, the equivalent of the sender's address and name, to ensure that the data reached the designated location.
TFTP General FTP
TFTP is a simplified FTP protocol used by diskless computers to transmit information. It is very simple, so it can be cured on the hard disk, and support no authentication operation. TFTP is a very insecure protocol.
Trojan Horse Trojan Horse
URL Uniform Resource Locator
UDP User Datagram Protocol
VDM Virtual DOS Machine
UUCP is a cat based file transfer protocol that has been used for a long time, and sometimes uses it to transmit Usenet news and e-mail on the Internet, especially on intermittently networked sites. Few stations now offer anonymous UUCP to access files. As a file transfer protocol, it is used by users who do not have access to the network and use the cat.
www World Wide Web
The WWW (Word Wide Web) is the latest information service on the Internet. It is a kind of interactive browsing retrieval tool based on hypertext file. Users can browse, transfer, and edit hypertext-formatted files on the internet via www.
Wan Wide Area Network
Virtual Server VM
Usenet
User Exchange Network Usenet is the main information source of network news server. Usenet is a completely private and spontaneous network of users who use the Internet to exchange information but do not rely entirely on the Internet to communicate. Use Usenet volunteers to comply with some of the agreed network usage rules.
User name username
User account Accounts
Web page pages
OpenGL Open Graphics Language
ODBC Open Database Connection
PCI Peripheral Connection Interface
.....................................................................
Authentication certification, identification
Authorization authorization
A software package for back Office Microsoft Company
Back up Backup
Backup Browser Backup Browser
BDC Backup domain Controller
Baseline baseline
BIOS basic input/output system
Binding, Collection
Bit bit, bits
BOOTP Boot protocol
BGP Boot Gateway Protocol
Bottleneck bottle diameter
Bridge Network Bridge, bridging device
Browser browser
Browsing Browse
Channel Channel, Access
CSU/DSU Channel Service Unit/digital Service Unit
Checksum Checksum
Cluster clusters, clusters
CGI Common Gateway Interface
CGI (Common Gateway Interface Public Gateway Interface is a program that can produce the same result or result that changes with user input. It can be written in an explanatory interface language, or in a compiled programming language. CGI sets the interface protocol standard for Web servers to invoke other executable programs. The Web server invokes the CGI program implementation and the interaction of the Web browser, which means that the CGI program accepts information that the Web browser sends to the Web server, processes it, and returns the results of the response to the Web server and Web browser. CGI programs generally complete the processing of form data in Web pages, database query and the integration of traditional application systems. CGI programs can be written in any programming language, but the CGI program written in C language has the characteristics of fast execution and high security.
Cgi-based attack (CGI attack) It exploits the vulnerability of a common Gateway interface, usually with the help of the WWW site.
Crash (crash) system suddenly fails and requires a new boot
CD-ROM read-only disc
Component components
Data link
Datagram Data Report
Default Document Defaults
Digital Key System Digital keypad control
Disk Mirroring diskette Mirroring
Distributed File System distributed filesystem
Data-driven Attack (data-driven attacks) rely on attacks that are hidden or encapsulated by data that is not detected by the firewall.
DNS spoofing (domain Name server spoofing) a method that an attacker can use to compromise a domain name server by spoofing a DNS cache or an internal attack (typically posing as a legitimate DNS server role for an attacker)
DOS (hey, it's not dos Oh, this is deniad of service, extremely denial-of-service) when users maliciously use the network information Server, they will refuse to provide services to legitimate users.
Eavesdropping eavesdropping, stealing
Encrypted tunnel encrypted channel
Enterprise Network Enterprise Network
Ethernet Ethernet
External Security External Safety
environment variable environment variable
Fax Modem Facsimile Cat
Attributes of File attribute
File system filesystem
File files
Form format
Fragments segment
Frame Relay Hardwood Relay
Firewall firewall
Firework (firewall) is one or a set of systems that strengthens the security between the Internet and the INTRANETP (intranet). Firewalls can determine which internal services allow external access and which outsiders are permitted to access the internal services allowed, and those external services can be accessed by internal personnel. For the firewall to work, all information from and to the Internet must go through the firewall.
The firewall only allows authorization information to pass, and the firewall itself cannot be infiltrated.
Gated daemon gated process (as if it were an early UNIX-seeking service)
Gateway Gateways
Global account globally
Global group Globals
Group groups
Group account Accounts
Group identifier Set Identifier
HCL Hardware Compatibility table
Hash hash Table
HPFS High Performance File system
Home Directory Master
Home Page Bamboo leaves
Hop Station, relay section
Host hosts
Hyperlink hypertext Link
Highjacking hijacking terminal, that is, the attacker captures the control of another user session. This is rare, and once it has occurred, the security of the target has been compromised. In fact, NetXRay is doing very well at this point.
HTPASSWD a system that protects sites on www (UNIX) with a password
Icon icons
Impersonation attack camouflage attack
Index Server indexing servers
ISA Industry standard Structure
inherieted Rights filter Inherit permissions filter
ISDN Integrated Services Digital Network
Interactive User Interactive Users
Intermediate System Intermediary Systems
Internal security Inside
Internet Explorer (IE) IBM's World Wide Web browser
Internet Server Internet Servers
Interpreter Interpretation Program
Intranet internal intranet, enterprise intranet
Intruder Invaders
IMAP a mail protocol
is an abbreviation for Internet message Access protocal. IMAP provides a means of managing mail on a remote server, similar to the POP protocol, but has more functionality than POPs, including downloading only the headers of messages, creating multiple mailboxes, and creating a folder on the server where messages are saved.
Java Virtual Machine Java VM
JavaScript a scripting language based on the Java language
Jack in a hacker commonly spoken, meaning to destroy the security of the server behavior
Kernel kernel
Keys key
Keyspace Key Space
Keystroke Recorder (key logger) tools for stealing other people's username and password
LAN Server LAN Servers
Local Security
Log logs, records
Logging Login
Logoff exit, logoff
Logical Port Logical Ports
Logon Registration
Logon Script logon scripts
LFN Long File name
Logic Bomb (Logic bomb) a program or code that can cause a system to lock up or fail.
Mass Browser Master Browser
Mapi
is the abbreviation of messaging application progrmming Interface. Microsoft and others have developed MAPI, enabling Windows applications to access multiple messaging systems from Microsoft Mail to Novell MHS. However, MAPI is limited to working on a regular level, a messaging-aware application that can exchange messages and data on the network.
Members Server member servers
Menu Menus
Message messages
Multilink multiple Links
MIME Multimedia Internet Mail Extensions
MPR Multi-Protocol router
Multiprocessing Multiple processing
Module modules
Multihomed host multi-homed mainframe
MUD
Mud's English full name is multiple user Dimension, multiple user dialogue or multiple user dungeon, translated as "multiplayer World", "multiplayer Dialogue" or "multiplayer Dungeon", commonly known as "mud" game.
Named pipes named pipe
NDS NetWare Directory Service
NetBEUI NetBIOS Extended User interface
NetBIOS Gateway NetBIOS Gateways
NetWare network operating system (sorry, I forgot it was developed by the company)
Network Network
NetBIOS network basic input/output system
NDIS Network Driver Interface Specification
NetDDE Network Dynamic Data exchange
NIC Network interface card
Network Layer Network layer
Network Monitor a Network Monitor program
Network operating system network operating system
Network Printer network printer
Network Security Network Safety
Network User network users
NFS Network File System
Node nodes
A npasswd UNIX proxy password checker that filters potential passwords before submitting them to a password file.
OSPF Open Shortest Path Priority protocol
OSI model Open Systems Interconnection mode
Out-of-band attack Out-of-band attack
Packet Filter Group Filter
Password Password
Path paths
Payload NET Load
PBX Private Switch
PCS Personal Communications Business
Peer equivalence
Permission permissions
PlainText plaintext
PPTP Point-to-Point Tunneling Protocol
Port ports
Prority Priority
Protocol protocol
Potential browser potential browsers
POP Internet Email Protocol Standard
is the abbreviation for post Office Protocol, which is the Internet E-mail protocol standard. We can send and receive e-mail through a host that has pop service capabilities. The drawback of this protocol is that when you receive an email, all the letters are purged from the server and downloaded to your local hard drive. There are, of course, some client programs that can leave e-mail messages on the server, or set them to a file that is larger than a certain size and cannot be downloaded. With the multimedia format of the message, the message will be more and more large, we want to be able to flexibly grasp what files to download, when to download, this requires an IMAP protocol. The current pop version is POP3.
Process processes
Proxy Agent
Proxy Server Proxy
Proxy service is to proxy web users to obtain data back, usually use the WWW software to connect remote terminals to obtain data, must send out the request signal and then one byte of the transmission back. Once the proxy is set, the signal to the data will be sent to the proxy Server first. When the proxy server gets the user's request, the first will go to the cache to look for the same information, if there is, the proxy server directly to the user, if the cache does not have data, Proxy server will be used on the network can use the bandwidth, To the remote platform to retrieve data, while stored in the cache, while transmitting to the user. Even if the line is blocked, it is faster than the user's own direct crawl.
Paseudorandom Pseudo Random
Phreaking refers to the process of controlling the telephone system
RAS Remote Access Service
Remote control
RPC Remote Procedure Call
Remote boot remotely boot
Route routing
Router Router
Routing route Selection
RIP Route Selection Information protocol
Routed daemon a UNIX path-seeking service using RIP
routing Table routing tables
R.U.P Routing Update Protocol
RSA a public key encryption algorithm. And RSA may be the most popular.
Script Scripts
Search engine
SSL Secure Sockets Layer
Secure Password
SID Security Identifier
Sender Sender
SLIP Serial Line Internet Protocol
Server servers
Server-based network server-based network
Session Layer Conversation Layer
Share, sharing sharing
Share-level Security Sharing level
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
Site sites
SCSI Small Computer System interface
Snffer Error detection device
Snooping Snoop
Standalone Server standalone servers
Strong cipher Strong password
Stream cipher Flow password
Strong Password Strong password
SQL Structured Query Language
Subnet Mask Subnet Mask
Subdirectory subdirectories
Subnet Subnet
Swap file Swap files
SACL System access Control table
S/key Secure connected one-time password system, in S/key, the password will never be sent through the network, so it is impossible to be stolen.
Sniffer (sniffer) secretly capture the data packets through the network program, hackers generally use it to try to steal user name and password.
Spoofing (spoofing) any process that involves impersonating another user or host to unauthorized access to a target
Time Bomb is a program that waits for a particular time or event to be activated before it causes a machine to fail.
TCPDUMP is a practical tool for capturing packets in UNIX and is often used to obtain detailed network traffic records.
Traceroute a common TCP program on UNIX that tracks routing between native and remote hosts
T0,DS0 56 or 64kbps
T1,DS1 24-channel PCM digital, with a total speed of 1.544Mbps
T3,DS3 28 T1 Channel, the work can speed of 44.736Mbps
Thin Client Thin Clients
Thread Threads
Throughput throughput
Transport Layer Transmission Volume
Transport Protocol Transport Protocol
Trust trusts
Tunnel Secure encrypted link
Vector of attack attack vectors
Virtual Directory Empty Catalog
Virtual Machine VM
VRML Virtual Reality Model language
Volume file Set
Vulnerability of vulnerability
Weak passwurd weak password
Well-known ports Universal port
Workstation workstation
X.25 a packet switching network protocol
Zone Transfer Zone Conversion

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.