Network technical terms

Source: Internet
Author: User
Tags file transfer protocol ftp protocol

Network technical terms

Trojan
It is called Trojan Horse ). The word "Trojan Horse" first appeared in Greek mythology. It is said that before 3000, in a Greek war. Manialos sent troops to fight the king of Troy, but they could not attack for a long time. They come up with an idea. First, they pretend to be defeated and leave a big Trojan Horse ,. The most powerful warrior is hidden in the Trojan! Finally, the warriors in the Trojan rushed out to defeat the enemy. This is the "Trojan Horse" later, and the Trojan horse in the hacker is a bit of a backdoor, that is, hiding the premeditated function in the public function to conceal the real attempt.
Broilers
The host that has been attacked and has control over it.

Stepping Stone
An auxiliary machine uses this host as an indirect tool to intrude into other hosts. It is generally used with bots.

Shell
Shell is the exchange interface of the system. Simply put, it is a communication environment between the system and the user. The DOS we usually use is a shell. (Win2kis cmd.exe)

Root
The user with the highest privilege in Unix, that is, the super administrator.

Admin
Windows NT, 2 K, XP users with the highest permissions, that is, super administrator.

Rootshell
An overflow program overflows a shell with root permissions on the host.

Exploit
Overflow program. Exploit usually contains some shellcode.

Shellcode
The API function to be called for an overflow attack. After the overflow, A swap interface * is required. So there is.
Shellcode.

Access Control List (ACL)
Access Control List

Access token
Access Token

Account lockout
Account Blocking

Account policies
Accounting Policy

Accounts
Account

Adapter
Adapter

Adaptive speed leveling
Adaptive speed level adjustment

Address Resolution Protocol (ARP)
Address Resolution Protocol

Administrator account
Administrator Account

ARPANET
Apache (predecessor of the internet)

Algorithm
Algorithm

Alias
Alias

Allocation
Allocation and positioning

Alias
Small applications

Allocation layer
Application Layer

API
Application Programming Interface

Anlpasswd
Proxy password checker similar to Passwd +

Applications
Applications

ATM
Asynchronous transmission mode

Attack
Attack

Audio policy
Audit Policy

Auditing
Review and Supervision

Back-end
Backend

Borde
Boundary

Borde gateway
Border Gateway

Breakabie
Password-breaking

Breach
Attack and Violation

Cipher
Password

Ciphertext
Ciphertext

CAlass A domain
Class A Domain

CAlass B domain
Class B domain

CAlass C domain
Class C domain
Classless addressing
Classless Address Allocation

Cleartext
Plaintext

CSNW Netware
Customer Service

Client
Customer and client

Client/server
Client/Server

Code
Code

COM port comport
(Communication Port)

CIX
Service Provider

Computer name
Computer Name

Crack
Break

Cryptanalysis
Password Analysis

DLC
Data Link Control

Decryption
Decryption

Database
Database

Dafault route
Default route

Dafault share
Default share

Denial of service
Denial of Service

Dictionary attack
Dictionary attack

Directory
Directory

Directory replication
Directory Replication

Domain
Domain

Domain controller
Domain Name Controller

Domain name
A domain name is actually the name of a computer that is connected to the Internet. It serves as a message that requires people's names and addresses.
Yes. The domain name structure is as follows: Host Name of the computer. organization name. Network Name. top-level domain name. Domain names are expressed in text.
IP addresses expressed in numbers are easy to remember. All levels of networks connected to the Internet follow the naming rules of DNS.
And is responsible for converting the domain name to the IP address during communication.

DNS Server
Domain Name System (DNS) refers to the directory service System that queries the Domain Name or IP address on the Internet.
System. When receiving a request, it can translate the domain name of another host into an IP address or vice versa. Most domain names
All maintain a large database, which describes the correspondence between domain names and IP addresses, and the database is
Update regularly. A translation request is usually sent from another computer on the network. It requires an IP address for route selection.

DDE
Dynamic Data Exchange

DHCP
Dynamic Host Configuration Protocol

Encryption
Encryption

EGP
External Gateway Protocol

FDDI
Optical Fiber Distributed Data Interface

FAT
File Allocation Table

FTP (File Transfer Protocol)
File Transfer Protocol

Filter
Filter

Firmware
Firmware

Flooding
Drowned

GSNW NetWare
Gateway Service
GDI (graphical device interface)
Graphical Device Interface

GUI
Graphical user interface

HTML
Hypertext Markup Language

HTTP
Hypertext Transfer Protocol

IGP
Internal Security

ICMP (Internet Control Message Protocol)
Internet Control Packet Protocol
The TCP/IP protocol used to send control and error messages about IP datagram transmission. When an IP datagram cannot be transmitted
To the destination, it may be because the destination machine is suspended or the information traffic is blocked. The router may use ICMP
Notify the sender of the failure message.
IGMP (Internet Group Management Protocol, Internet Group Management Protocol)
This TCP/IP protocol allows Internet hosts to participate in multi-point broadcast (multicasting)-a type of broadcast to a computer group
Effective means of information

IIS
Information Server

IP (Internet Protocol)
Internet Protocol

IRC
Online Chat

ISP
Network Service Provider

IPX
Internet connection group protocol

IPC
Inter-process communication

IRQ
Interrupt request

IP address
An IP address is a 32-bit IP address assigned to the host. It consists of 4 bytes and is divided into dynamic
Static IP addresses. Dynamic IP addresses refer to different addresses obtained by each connection, but static IP addresses
The status IP address is the same fixed address for each connection. Generally, the address obtained by dialing
All are dynamic, that is, the obtained address is different each time.

IP masquerade
IP camouflage

IP spoofing
IP Spoofing

LAN
Lan

LPC
Local process call

NNTP
Network News Transfer Protocol

PPP Point-to-Point Protocol
The Point to Point Protocol is used to adapt
The protocol established by the user to communicate with each other through telephone lines.

PDC
Primary Domain Controller

Telnet
Remote Login

TCP/IP Transmission Control Protocol/Internet Protocol
TCP/IP communication protocols mainly include the standards of network communication details on the Internet, and a group of network interconnection protocols.
And the path selection algorithm. TCP is a transmission control protocol, which is equivalent to an item packing list to ensure that data is not transmitted during transmission.
Will be lost. The IP address is an inter-network protocol, which is equivalent to the address and name of the recipient and ensures that the data arrives at the specified location.

TFTP Common File Transfer Protocol
TFTP is a simplified FTP protocol used by diskless computers to transmit information. It is very simple, so it can be solidified in hard
Disks, and supports no authentication. TFTP is a very insecure protocol.

Trojan Horse
Trojan Horse

URL
Uniform Resource Locator

UDP
User Datagram Protocol

VDM
Virtual DOS host

UUCP
It is a cat-based file transfer protocol that has been used for a long time. Sometimes it is used for transmission over the Internet.
Usenet news and E-mail, especially on disconnected websites. Few websites now provide anonymous UUCP
Access a file. It is a File Transfer Protocol, which is used only by users who do not access the network and use the cat.

WWW
WWW (Word Wide Web) is the latest Internet Information Service. It is a type of hypertext file-based
Interactive browser retrieval tool. You can use WWW to browse, transmit, and edit files in hypertext format on the Internet.

WAN
Wan

Virtual server
Virtual Server

Usenet
Usenet is the main information source of the network news server. Usenet is completely a private spontaneous Establishment
User communication networks that use the Internet to exchange information but do not fully rely on the Internet for communication. Use
Usenet volunteers abide by some agreed network usage rules.

USER name
User Name

USER account
User Account

Web page
Webpage

OpenGL
Open Graphics Language

ODBC
Open Database Connection

PCI
Peripheral connection interface

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.