ZyXEL Communications ZYWALL10 User Manual

Page 258

Advertising
background image

ZyWALL 10 Internet Security Gateway

T

Glossary of Terms

This category of computer criminal includes several different types of illegal activities
Making copies of software for others to use. Distributing pirated software over the
Internet or a Bulletin Board System. Receiving or downloading illegal copies of software
in any form.

Pirated Software

Software that has been illegally copied, or that is being used in violation of the
software's licensing agreement. Pirated software is often distributed through pirate
bulletin boards or on the Internet. In the internet underground it is known as Warez.

Plain Text

The opposite of Cipher Text, Plain Text is readable by anyone.

ZyWALL Web
Configurator

This is a web-based ZyWALL router (not all) configurator that includes an Internet
Access Wizard, Advanced and Firewall (not all ZyWALL models) configurations.

PNS

PPTP Network Server. A PNS must have IP connectivity.

POP

Post Office Protocol. This is a common protocol used for sending, receiving, and
delivering mail messages.

Port (H/W)

An interface on a computer for connecting peripherals or devices to the computer. A
printer port, for example, is an interface that is designed to have a printer connected to
it. Ports can be defined by specific hardware (such as a keyboard port) or through
software.

Port

An Internet port refers to a number that is part of a URL, appearing after a colon (:) right
after the domain name. Every service on an Internet server listens on a particular port
number on that server. Most services have standard port numbers, e.g. Web servers
normally listen on port 80.

POTS

Plain Old Telephone Service is the analog telephone service that runs over copper
twisted-pair wires and is based on the original Bell telephone system. Twisted-pair wires
connect homes and businesses to a neighborhood central office. This is called the local
loop. The central office is connected to other central offices and long-distance facilities.

PPP

Point to Point Protocol. PPP encapsulates and transmits IP (Internet Protocol)
datagrams over serial point-to-point links. PPP works with other protocols such as IPX
(Internetwork Packet Exchange). The protocol is defined in IETF (Internet Engineering
Task Force) RFC 1661 through 1663. PPP provides router-to-router, host-to-router, and
host-to-host connections.

PPTP

Point-to-Point Tunneling Protocol.

Promiscuous
Packet Capture

Actively capturing packet information from a network. Most computers only collect
packets specifically addressed to them. Promiscuous packet capture acquires all
network traffic it can regardless of where the packets are addressed.

Protocol

A “language” for communicating on a network. Protocols are sets of standards or rules
used to define, format, and transmit data across a network. There are many different
protocols used on networks. For example, most web pages are transmitted using the
HTTP protocol.

Advertising