Access Control List (ACL) Access Control List
Access token
Account lockout account Blocking
Account policies Accounting Policy
Accounts account
Adapter
Adaptive speed leveling adaptive speed level adjustment
Address Resolution Protocol (ARP) Address Resolution Protocol
Administrator account
ARPANET Apache (predecessor of the internet)
Algorithm
Alias
Allocation and positioning
Alias small Application
Allocation layer application layer
API Application Programming Interface
Anlpasswd is a proxy password checker similar to Passwd +.
Applications
ATM asynchronous transmission mode
Attack
Audio policy Audit policy
Auditing review and monitoring
Back-end backend
Borde Boundary
Borde gateway
Breakabie can break passwords
Breach attack and Violation
Cipher Password
Ciphertext
CAlass A domain A class domain
CAlass B domain B class domain
CAlass C domain C Class domain
Classless addressing classless Address Allocation
Cleartext plaintext
CSNW Netware Customer Service
Client customer, client
Client/server
Code
COM port comport (Communication port)
CIX service provider
Computer name
Crack intrusion
Cryptanalysis password Analysis
DLC Data Link Control
Decryption
Database
Dafault route default route
Dafault share default share
Denial of service
Dictionary attack
Directory
Directory replication
Domain
Domain controller domain name controller
Domain name
A domain name is actually the name of a computer that is connected to the Internet. Its function is as important as writing people's names and addresses in a mail. The domain name structure is as follows: Host Name of the computer. organization name. Network Name. top-level domain name. Domain names are expressed in text, which is easier to remember than IP addresses expressed in numbers. All levels of networks that join the Internet follow the naming rules of DNS to name the computers in the network, and are responsible for converting the domain name to IP address during communication.
DNS Server
DNS (Domain Name System) refers to the directory service System that queries the Domain Name or IP address on the Internet. When receiving a request, it can translate the domain name of another host into an IP address or vice versa. Most domain name systems maintain a large database that describes the ing between domain names and IP addresses, and the database is regularly updated. A translation request is usually sent from another computer on the network. It requires an IP address for route selection.
Dynamic DDE data exchange
DHCP Dynamic Host Configuration Protocol
Encryption
EGP external Gateway Protocol
FDDI Optical Fiber Distributed Data Interface
FAT file allocation table
File Transfer Protocol (FTP)
Filter
Firmware
Flooding
GSNW NetWare gateway service
GDI (graphical device interface) graphical device interface
GUI
HTML Hypertext Markup Language
HTTP Hypertext Transfer Protocol
IGP Internal Security
Internet Control Message Protocol (ICMP)
The TCP/IP protocol used to send control and error messages about IP datagram transmission. When an IP datagram cannot be transmitted
To the destination, it may be because the destination machine is suspended or the information traffic is blocked. The router may use ICMP
Notify the sender of the failure message.
IGMP (Internet Group Management Protocol, Internet Group Management Protocol)
This TCP/IP protocol allows Internet hosts to participate in multi-point broadcast (multicasting)-a type of broadcast to a computer group
Effective means of information
IIS Information Server
IP (Internet Protocol) Internet Protocol
IRC online chat
ISP network service provider
IPX Internet connection group protocol
IPC inter-process communication
IRQ interrupt request
IP address
An IP address is a 32-bit IP address assigned to the host. It consists of 4 bytes and is divided into dynamic
Static IP addresses. Dynamic IP addresses refer to different addresses obtained by each connection, but static IP addresses
The status IP address is the same fixed address for each connection. Generally, the address obtained by dialing
All are dynamic, that is, the obtained address is different each time.
IP masquerade IP camouflage
IP spoofing
LAN
LPC local process call
NNTP Network News Transfer Protocol
PPP Point-to-Point Protocol
The Point-to-Point Protocol is a Protocol designed for users who cannot communicate with each other over a telephone line.
PDC Primary Domain Controller
Telnet Remote Login
TCP/IP Transmission Control Protocol/Internet Protocol
TCP/IP communication protocols mainly include the standards of network communication details on the Internet, as well as a set of network interconnection protocols and path selection algorithms. TCP is a transmission control protocol, which is equivalent to an item packing list to ensure that data is not lost during transmission. The IP address is an inter-network protocol, which is equivalent to the address and name of the recipient and ensures that the data arrives at the specified location.
TFTP Common File Transfer Protocol
TFTP is a simplified FTP protocol used by diskless computers to transmit information. It is very simple, so it can be solidified on the hard disk, and supports non-authentication operations. TFTP is a very insecure protocol.
Trojan Horse
Uniform URL Resource Locator
UDP User Datagram Protocol
VDM Virtual DOS host
UUCP is a cat-based file transfer protocol that has been used for a long time. Sometimes it is used to transmit Usenet news and E-mail over the Internet, especially on disconnected websites. Currently, few websites provide anonymous UUCP to access files. It is a File Transfer Protocol, which is used only by users who do not access the network and use the cat.
WWW
WWW (Word Wide Web) is the latest Internet Information Service. It is an interactive browsing and retrieval tool based on Hypertext files. You can use WWW to browse, transmit, and edit files in hypertext format on the Internet.
WAN
Virtual server
Usenet
Usenet is the main information source of the network news server. Usenet is a user communication network established by the masses, which uses the Internet to exchange information but is not completely dependent on the Internet for communication. Volunteers who use Usenet abide by some agreed network usage rules.
USER name
USER account
Web page
OpenGL open Graphics Language
ODBC Open Database Connection
PCI peripheral connection interface
.....................................................................
Authentication and authentication
Authorization
A Software Package for Back Office Microsoft
Back up backup
Backup browser
BDC backup Domain Controller
Baseline
BIOS Basic Input/Output System
Binding Association and collection
Bit and binary bit
BOOTP Boot Protocol
BGP guiding Gateway Protocol
Bottleneck bottle diameter
Bridge and bridge
Browser
Browses browsing
Channel channels and channels
CSU/DSU channel service unit/digital service unit
Checksum
Cluster clusters and clusters
CGI public Gateway Interface
CGI (Common Gateway Interface) is a program that can produce the same results or the results change with user input. It can be written in an explanatory interface language or a compilation programming language. CGI specifies the interface protocol standard for the Web server to call other executable programs. The Web server calls the CGI program to implement interaction with the Web browser, that is, the CGI program receives and processes the information sent to the Web server by the Web browser, then, the response is sent back to the Web server and Web browser. CGI programs generally process form data on Web pages, query databases, and integrate with traditional application systems. Although CGI programs can be written in any programming language, CGI programs written in C language have the features of fast execution speed and high security.
CGI-based attack (CGI-based attack), which uses the vulnerabilities of public gateway interfaces to attack, usually through www sites.
The crash (crash) system suddenly becomes invalid and requires a new boot.
CD-ROM read-only Disc
Component
Data link
Datasync datagram
Default document
Digital key system digital keying system
Disk mirroring
Distributed file system
Data-driven attack (data-driven attacks) relies on attacks that hide or encapsulate data, and the data is not noticed through the firewall.
DNS spoofing (Domain Name Server electronic spoofing) attackers use to damage the Domain Name Server, a method that can be achieved by spoofing the DNS's high-speed cache or internal attacks (generally, attackers pretend to be legitimate DNS server roles)
DoS (hey, it's not DOS, it's deniad of service, it's a massive Denial of service) when a user maliciously uses the network information server, it will refuse to provide services to legitimate users.
Eavesdropping and theft
Encrypted tunnel encryption Channel
Enterprise network
Ethernet
External security
Environment variable
Fax modem
File attribute
File system
File
Form Format
Fragments Segmentation
Frame relay slave relay
Firewall
Firework (firewall) is one or more systems that enhance security protection between the Internet and Intranetp (Intranet. The firewall can determine which internal services are allowed