11.01.2013 Views

Workshop

Workshop

Workshop

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

An essential part of a network interface card (NIC) that connects the network cable to the card.<br />

Most 10BaseT cards have them built in; however, in some cases, you might have to get a<br />

transceiver for an AUI port to connect to 10BaseT cable.<br />

transport layer<br />

Layer 4 of the OSI reference model. This layer controls the movement of data between systems,<br />

defines the protocols for messages, and does error checking.<br />

trap door<br />

See back door.<br />

Trivial File Transfer Protocol (TFTP)<br />

An antiquated file transfer protocol now seldom used on the Internet. (TFTP is a lot like FTP<br />

without authentication.) Frequently used for “diskless” booting from the network.<br />

Trojan Horse<br />

An application or code that, unbeknownst to the user, performs surreptitious and unauthorized<br />

tasks that can compromise system security. (Also referred to as a Trojan.)<br />

trusted system<br />

An operating system or other system secure enough for use in environments where classified<br />

information is warehoused.<br />

tunneling<br />

The practice of encapsulating one type of traffic within another type of traffic. For example, if you<br />

only had a TCP/IP connection between two sites, you might tunnel IPX/SPX traffic within the<br />

TCP/IP traffic. Nowadays, tunneling often implies employing encryption between two points, thus<br />

shielding that data from others who may be surreptitiously sniffing the wire. These types of<br />

tunneling procedures encrypt data within packets, making it extremely difficult for outsiders to<br />

access such data.<br />

twisted pair<br />

A cable made up of one or more pairs of wires that are twisted to improve their electrical<br />

performance.<br />

User Datagram Protocol (UDP)<br />

A connectionless protocol from the TCP/IP family. Connectionless protocols will transmit data<br />

between two hosts even though those hosts do not currently have an active session. Such protocols<br />

are considered “unreliable” because there’s no absolute guarantee that the data will arrive as it as<br />

intended.<br />

user<br />

Anyone who uses a computer system or system resources.<br />

user ID<br />

In general, any value by which a user is identified, including his or her username. More<br />

specifically, and in relation to UNIX and other multiuser environments, any process ID—usually a<br />

numeric value—that identifies the owner of a particular process. See also owner and user.<br />

UTP<br />

Unshielded twisted pair. See also 10BaseT.<br />

virtual private network (VPN)<br />

VPN technology allows companies with leased lines to form a closed and secure circuit over the<br />

Internet, between themselves. In this way, such companies ensure that data passed between them

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!