Thursday, March 3, 2011

【 Weak current College 】 network security professional vocabulary (4)---Power By 【 China power house network 】


DNS spoofing (domain name server spoofing) attacker uses to compromise the domain name server DNS through deception or the cache should attack to achieve one way (usually the attackers posing as legitimate DNS server role), DoS (God is not a DOS Oh, this is a great service, deniad of denial of service) users to malicious uses Internet Information Server, will refuse to legitimate users. Eavesdropping eavesdropping, theft of encrypted tunnel encryption channel enterprise network enterprise nets Ethernet Ethernet External security external security environment variable, environment variables, fax modem fax cat file attribute file properties file system file system file file form format fragments fragment frame relay frame relay firewall firewall Firework (firewall) is enhanced with Internet and Intranetp (intranet) security and protection of one or a group of systems. A firewall can determine which internal services allow external access, what an outsider is allowed by the license access internal services, those external services can be accessed by internal staff. In order to enable the firewall to be effective from and destined for the Internet of all information must be transmitted through a firewall. Firewall allows only authorized information passed, but the firewall itself cannot be penetrated. Gated daemon gated process (as an early UNIX routing service) gateway Gateway global account global accounts group global group global group account group account group set group identifier group identifier HCL hardware compatibility table hash hash table HPFS high performance file system Home directory home directory home page bamboo hop post, relay segment host host hyperlink hyperlinks highjacking hijacking Terminal, the attacker captures another user session control. This is very rare, in the event that indicates that the target of security has been compromised. In fact, at this point to NetXRay do very well. HTPASSWD a password to protect WWW (UNIX) on the site system icon icon impersonation attack disguised attack index server indexing server ISA industry standard architecture Inherieted Rights Filter inherited permissions filter ISDN integrated services digital network interactive user interactivity user intermediate system intermediary system internal security internal security Internet Explorer (IE) IBM Web-browsers Internet server Internet Server Interpreter interpreter intranet intranet intranet intruder intruder a IMAP mail protocol is the Internet Message Access Protocal abbreviation. IMAP provides a remote server management means that messages with the POP Protocol, but with more features than the POP, features include: download only message headers, create multiple mailboxes and server set up to save the message in the folder. Java Virtual Machine Java virtual machine for java script language based on Java scripting language of a jack in a hacker common spoken language, meaning to destroy Server security kernel kernel keys key keyspace key space Keystroke Recorder (key logger) some words stolen user names and passwords tool LAN Server LAN Server Local security local security log log, record logging logon logoff exit, logoff logical port logical port logon script logon script registration logon LFN long file name logic bomb (logical bombs) one can cause the system to lock or failure of the program or code. Mass browser master browser is MAPI Messaging Application abbreviation Progrmming Interface. Microsoft and other companies have developed the MAPI enables Windows applications access to the Mail from Microsoft to Novell's MHS multiple messaging systems. However, MAPI is limited to the level of the daily work, that is the perception of the work on the mail application that can exchange messages on the network and data.

No comments:

Post a Comment