ZyXEL Communications A-6000 User Manual

Page of 46
A-6000 High Speed, Long Range Ethernet Wireless Bridge 
 
CLI commands 
 
5-7 
the most common cable used. 
SUA 
Single User Account – The Prestige's SUA (Single User Account) feature allows 
multiple user Internet access for the cost of a single ISP account - see also 
NAT. 
TCP 
Transmission Control Protocol handles flow control and packet recovery and IP 
providing basic addressing and packet-forwarding services.   
Telnet 
Telnet is the login and terminal emulation protocol common on the Internet and 
in UNIX environments. It operates over TCP/IP networks. Its primary function is 
to allow users to log into remote host systems. 
Tempest 
  Illegal interception of data from computers and video signals. 
Terminal 
A device that allows you to send commands to a computer somewhere else. At 
a minimum, this usually means a keyboard and a To display screen and some 
simple circuitry.   
Terminal 
Software 
Software that pretends to be (emulates) a physical terminal and allows you to 
type commands to a computer somewhere else. 
TFTP 
Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP 
(File Transfer Protocol), but it is scaled back in functionality so that it requires 
fewer resources to run. TFTP uses the UDP (User Datagram Protocol) rather 
than TCP (Transmission Control Protocol). 
Trojan or Trojan 
Horse 
Like the fabled gift to the residents of Troy, a Trojan Horse is an application 
designed to look innocuous. Yet, when you run the program it installs a virus or 
memory resident application that can steal passwords, corrupt data, or provide 
hackers a back door into your computer. Trojan applications are particularly 
dangerous since they can often run exactly as expected without showing any 
visible signs of intrusion. 
UDP 
UDP is a connectionless transport service that dispenses with the reliability 
services provided by TCP. UDP gives applications a direct interface with IP and 
the ability to address a particular application process running on a host via a 
port number without setting up a connection session. 
UNIX 
A widely used operating system in large networks. 
URL 
(Uniform Resource Locator) URL is an object on the Internet or an intranet that 
resides on a host system. Objects include directories and an assortment of file 
types, including text files, graphics, video, and audio. A URL is the address of 
an object that is normally typed in the Address field of a Web browser. The URL 
is basically a pointer to the location of an object. 
VPN 
Virtual Private Network. These networks use public connections (such as the 
Internet) to transfer information. That information is usually encrypted for 
security purposes. 
Vulnerability 
  Point where a system can be attacked. 
WAN 
Wide Area Network s link geographically dispersed offices in other cities or 
around the globe. Just about any long-distance communication medium can 
serve as a WAN link, including switched and permanent telephone circuits, 
terrestrial radio systems, and satellite systems. 
War Dialer 
A program that automatically dials phone numbers looking for computers on the 
other end. They catalog numbers so that hackers can call back and try to break 
in. 
Warez 
A term that describes Pirated Software on the Internet. Warez include cracked 
games or other programs that software pirates distribute on the Internet 
Web 
Configurator 
This is a web-based router (not all) configurator that includes an Internet Access 
Wizard, Advanced. 
Wire Tapping 
Connecting to a network and monitoring all traffic. Most wire tapping features 
can only monitor the traffic on their subnet. 
Worm 
A program that seeks access into other computers. Once a worm penetrates 
another computer it continues seeking access to other areas. Worms are often 
equipped with dictionary-based password crackers and other cracker tools that 
enable them to penetrate more systems. Worms often steal or vandalize 
computer data.