11.01.2013 Views

Workshop

Workshop

Workshop

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

See protocol stack.<br />

STP<br />

See shielded twisted pair.<br />

suite<br />

A term used to describe a collection of similar protocols. This term is used primarily when<br />

describing TCP- and IP-based protocols (when talking about the “TCP/IP suite”).<br />

TCP/IP<br />

Transmission Control Protocol/Internet Protocol. The protocols used by the Internet.<br />

Telnet authentication option<br />

Protocol options for Telnet that add basic security to Telnet-based connections, based on rules at<br />

the source routing level. Refer to RFC 1409 for details.<br />

Telnet<br />

A protocol and an application. Telnet allows you to control your system from remote locations.<br />

During a Telnet session, your machine responds much as it would if you were actually working on<br />

its console.<br />

TEMPEST<br />

Transient Electromagnetic Pulse Surveillance Technology. TEMPEST is the practice and study of<br />

capturing or eavesdropping on electromagnetic signals that emanate from any device (in this case,<br />

a computer). TEMPEST shielding is any computer security system designed to defeat such<br />

eavesdropping.<br />

terabyte<br />

1,099,511,627,776 bytes (abbreviated as TB).<br />

terminator<br />

A small plug that attaches to the end of a segment of coax Ethernet cable. This plug provides a<br />

resistor to keep the signal within specifications.<br />

TFTP<br />

See Trivial File Transfer Protocol.<br />

Token-Ring<br />

A network that’s connected in a ring topology, in which a special “token” is passed from<br />

computer to computer. A computer must wait until it receives this token before sending data over<br />

the network.<br />

topology<br />

The method or systems by which your network is physically laid out. For example, Ethernet and<br />

Token-Ring are both network topologies, as are “star” versus “bus” wiring. The former is a<br />

network topology; the latter is a physical topology.<br />

traceroute<br />

A TCP/IP program common to UNIX that records the routers used between your machine and a<br />

remote host. Available on Windows as tracert.<br />

traffic analysis<br />

The study of patterns in communication rather than the content of the communication. For<br />

example, studying when, where, and to whom particular messages are being sent, without actually<br />

studying the content of those messages.<br />

transceiver

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!