11.01.2013 Views

Workshop

Workshop

Workshop

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

across several disks, and one drive keeps checking information so that if one drive fails, the data<br />

can be rebuilt.<br />

repeater<br />

A device that strengthens a signal so it can travel further distances.<br />

request for comments (RFC)<br />

RFC documents are working notes of the Internet development community. These are often used<br />

to propose new standards. A huge depository of RFC documents can be found at<br />

http://www.internic.net.<br />

Reverse Address Resolution Protocol (RARP)<br />

A protocol that maps Ethernet addresses to IP addresses.<br />

RIP<br />

See Routing Information Protocol.<br />

rlogin<br />

A UNIX program that allows you to connect your terminal to remote hosts. This program is much<br />

like Telnet, except it allows you to dispense with entering your password each time you log in.<br />

Unfortunately, it authenticates you via an IP address, so it’s vulnerable to IP spoofing. See also IP<br />

spoofing.<br />

router<br />

A device that routes packets in and out of a network. Many routers are sophisticated and can serve<br />

as firewalls.<br />

Routing Information Protocol (RIP)<br />

A protocol that allows Internet hosts to exchange routing information. (See RFC 1058 for more<br />

information on RIP.)<br />

RSA<br />

A public key encryption algorithm named after its creators (Rivest, Shamir, and Adleman). RSA<br />

is probably the most popular of such algorithms and has been incorporated into many commercial<br />

applications, including but not limited to Netscape Navigator, Communicator, and even Lotus<br />

Notes. Find out more about RSA at http://www.rsa.com.<br />

S/Key<br />

One-time password system to secure connections. Because each session uses a different password,<br />

sessions that use S/KEY are not vulnerable to packet capture attacks. In other words, even if<br />

someone finds out that the password for your current session is “MYSECRET,” he or she doesn’t<br />

know the password for the next session, “OUTTALUCK.” (Refer to RFC 1760 for more<br />

information.)<br />

Secure Socket Layer (SSL)<br />

A security protocol (created by Netscape Communications Corporation) that allows client/server<br />

applications to communicate free of eavesdropping, tampering, and message forgery. SSL is now<br />

used for secure electronic commerce. To find out more, go to<br />

http://home.netscape.com/eng/ssl3/draft302.txt.<br />

secured electronic transaction (SET)<br />

A standard of secure protocols associated with online commerce and credit card transactions.<br />

(Visa and MasterCard are the chief players in development of the SET protocol.) Its purpose is<br />

ostensibly to make electronic commerce more secure.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!