Tuesday, January 11, 2011

【 Weak current College 】 network security professional vocabulary (5)



Memberserver Member Server

Menu menu

Message message

Multilink more links

Multimedia Internet Mail Extensions MIME

MPR multi-protocol router

Multiprocessing multiprocessing

Module module

Multihomedhost multi-homed host

MUD

The English name is MUD MultipleUserDimension, MultipleUserDialogue or

MultipleUserDungeon, translated as "people of the world," and "many people dialogue" or "many people Dungeon", commonly known as "mud" game.

Namedpipes named pipes

NDSNetWare directory services

NetBEUINetBIOS extended user interface

NetBIOSgatewayNetBIOS gateway

NetWare network operating system (sorry, I forgot is that Corporation)

Network network

NetBIOS network basic input/output system

NDIS network driver interface specification

NetDDE network dynamic data exchange

NIC network interface card

Networklayer network layer

NetworkMonitor a network monitoring program

Networkoperatingsystem network operating system

Networkprinter network printer

Networksecurity network security

Networkuser network users

NFS network file system

Node node

NpasswdUNIX of proxy password checker, submitted to the password file, it will have on potential password screen.

OSPF open shortest path first Protocol

OSIModel Open Systems Interconnection model

Out-of-bandattack band attack

Packetfilter grouping filter

Password password

Path-path

Payload NET load

Private branch exchange PBX

PCS personal communications services

Peer to peer

Permission rights

Plaintext plaintext

PPTP point-to-Point Tunneling Protocol

Port port

Prority priority

Protocol Agreement

Potentialbrowser potential browser

POP Internet e-mail protocol standards

Is an abbreviation that is PostOfficeProtocol Internet e-mail protocol standards. We can have the POP service function of the host route and receive e-mail messages. The agreement of the defect is that when you receive e-mail messages, all letters are clear from the server, download to your local hard disk. Of course there are also some client programs can use email to stay on the server, or set to exceed a certain size of file is not downloaded. As the message uses the media format, the messages are larger and larger, we hope to be able to download any files flexibly, when to download, this requires the IMAP protocol. The current version is POP3 POP.

Process process

Proxy-agent

Proxyserver proxy server

The proxy service is the proxy Web users to obtain information on the back, often use WWW software to link remote terminal access to information, you must submit a request signal and then a byte byte transmitted back. The proxy setting, requests for information will be sent to signal ProxyServer. When the ProxyServer is at the user's request, it will first look for the cache are not the same information, if any, regarding the information directly from the ProxyServer will be passed on to the user, if the cache does not have information, it will use network ProxyServer that you can use the bandwidth, to collect information on the distal platform, storage in cache, side transfer to the user. Even if the line blocking, or than the user's own direct access to far more quickly.

No comments:

Post a Comment