Tuesday, January 11, 2011
【 Weak current College 】 network security professional vocabulary (5)
Memberserver Member Server
Menu menu
Message message
Multilink more links
Multimedia Internet Mail Extensions MIME
MPR multi-protocol router
Multiprocessing multiprocessing
Module module
Multihomedhost multi-homed host
MUD
The English name is MUD MultipleUserDimension, MultipleUserDialogue or
MultipleUserDungeon, translated as "people of the world," and "many people dialogue" or "many people Dungeon", commonly known as "mud" game.
Namedpipes named pipes
NDSNetWare directory services
NetBEUINetBIOS extended user interface
NetBIOSgatewayNetBIOS gateway
NetWare network operating system (sorry, I forgot is that Corporation)
Network network
NetBIOS network basic input/output system
NDIS network driver interface specification
NetDDE network dynamic data exchange
NIC network interface card
Networklayer network layer
NetworkMonitor a network monitoring program
Networkoperatingsystem network operating system
Networkprinter network printer
Networksecurity network security
Networkuser network users
NFS network file system
Node node
NpasswdUNIX of proxy password checker, submitted to the password file, it will have on potential password screen.
OSPF open shortest path first Protocol
OSIModel Open Systems Interconnection model
Out-of-bandattack band attack
Packetfilter grouping filter
Password password
Path-path
Payload NET load
Private branch exchange PBX
PCS personal communications services
Peer to peer
Permission rights
Plaintext plaintext
PPTP point-to-Point Tunneling Protocol
Port port
Prority priority
Protocol Agreement
Potentialbrowser potential browser
POP Internet e-mail protocol standards
Is an abbreviation that is PostOfficeProtocol Internet e-mail protocol standards. We can have the POP service function of the host route and receive e-mail messages. The agreement of the defect is that when you receive e-mail messages, all letters are clear from the server, download to your local hard disk. Of course there are also some client programs can use email to stay on the server, or set to exceed a certain size of file is not downloaded. As the message uses the media format, the messages are larger and larger, we hope to be able to download any files flexibly, when to download, this requires the IMAP protocol. The current version is POP3 POP.
Process process
Proxy-agent
Proxyserver proxy server
The proxy service is the proxy Web users to obtain information on the back, often use WWW software to link remote terminal access to information, you must submit a request signal and then a byte byte transmitted back. The proxy setting, requests for information will be sent to signal ProxyServer. When the ProxyServer is at the user's request, it will first look for the cache are not the same information, if any, regarding the information directly from the ProxyServer will be passed on to the user, if the cache does not have information, it will use network ProxyServer that you can use the bandwidth, to collect information on the distal platform, storage in cache, side transfer to the user. Even if the line blocking, or than the user's own direct access to far more quickly.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment