every device on the internet is technically known as a host
What is a bind server?
a DNS server on the internet
What is a “name server”?
a DNS server
What is anti-passback?
The main purpose of an anti-passback system is to prevent a card holder from passing their card back to a second person to gain entry into the same controlled area
What is a mirrored site?
On the Internet, a mirror site is an exact copy of another Internet site. Mirror sites are most commonly used to provide multiple sources of the same information, and are of particular value as a way of providing reliable access to large downloads. Mirroring is a type of file synchronization
What is a Faraday cage?
The important concept to remember is that a Faraday cage acts as a shield against the effects of electromagnetic energy
What is PPPoE?
Point to Point Protocol over Ethernet is a proposal specifying how a host personal computer (PC) interacts with a broadband modem (i.e. xDSL, cable, wireless, etc) to achieve access to the growing number of High speed data networks. Relying on two widely accepted standards, Ethernet and the point-to-point protocol (PPP), the PPPoE implementation requires virtually no more knowledge on the part of the end user other than that required for standard Dial up Internet access
What is a PTR record?
DNS Records are the prime defining factor for a proper functioning of any Name Service. PTR Records refer to Pointer Record. This is mostly used to have a particular host be recognized on the internet by using an IP Address instead of the hostname. These are also called Reverse DNS Lookup address.
For what is port 53 used?
What are CRLs?
certificate revocation lists
What is VMOS?
v-shaped metal-oxide semiconductor
For what is port 443 used?
https, http over SSL
What is a supplicant?
A Wireless Supplicant is a program that runs on a computer and is responsible for making login requests to a wireless network. It handles passing the login and encryption credentials to the authentication server. It also handles roaming from one wireless access point to another, in order to maintain connectivity
What is PAP?
PAP is used by Point to Point Protocol to validate users before allowing them access to server resources. Almost all network operating system remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore considered insecure. It is used as a last resort when the remote server does not support a stronger authentication protocol, like CHAP or EAP (while the last is actually a framework
What is EAP?
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and Point-to-Point connections. The WPA and WPA2 standard has adopted five EAP types as its official authentication mechanisms.
What is NAC?
network access control. A network is often vulnerable to internal attacks from hosts on its own network rather that malicious entities attacking from outside the network. NAC lets your network devices allow or deny access to clients based on predefined access policies. NAC policies help prevent viruses and worms that have infected a client on your network from infecting other systems by denying the client access to the network based on its current status
For what is port 25 used?
What is OSW?
The new Oracle OS watcher (OSWatcher) reports CPU, RAM and Network stress, and is a new alternative for monitoring Oracle servers
What are reciprocal sites?
A reciprocal link is a mutual link between two objects, commonly between two websites to ensure mutual traffic. Example: Alice and Bob have websites. If Bob's website links to Alice's website, and Alice's website links to Bob's website, the websites are reciprocally linked.
What is an x.509 certificate?
In cryptography, X.509 is an ITU-T standard for a public key infrastructure (PKI) for single sign-on (SSO) and Privilege Management Infrastructure (PMI). X.509 specifies, amongst other things, standard formats for public key certificates, certificate revocation lists, attribute certificates, and a certification path validation algorithm
What is FIN/RST?
a packet sent to get past your firewall when your network is under attack
What is SYN/ACK?
The second part of the three-way handshake is a SYN/ACK response. It is an acknowledgement of the SYN packet
What is KEA?
key phrase extraction algorithm. KEA is an algorithm for extracting key phrases from text documents
What is SAFER?
In cryptography, SAFER (Secure And Fast Encryption Routine) is the name of a family of block ciphers
What is IRC?
internet relay chat. A form of real-time Internet text messaging (chat) or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message as well as chat and data transfers via Direct Client-to-Client
What is a shadow copy?
Shadow Copy (Volume Snapshot Service or Volume Shadow copy Service or VSS ), is a technology included in Microsoft Windows that allows taking manual or automatic backup copies or snapshots of data, even if it has a lock, on a specific volume at a specific point in time over regular intervals
What is TCPdump?
tcpdump is a common packet analyzer that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Tcpdump works on most Unix-like operating systems
What is IPX/SPX?
Internetwork Packet Exchange/Sequenced Packet Exchange. IPX and SPX are networking protocols used primarily on networks using the Novell NetWare operating systems
What are shadow passwords?
Unix-like operating systems use the shadow password database mechanism to increase the security level of passwords by restricting all but highly privileged users' access to encrypted password data. Typically, that data is kept in files owned by and accessible only by, the super user (ie, on Unix-like systems, the root user, and on many others, the administrator account
What is a SYN flood attack?
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system. A malicious client can skip sending this last ACK message. If these half-open connections bind resources on the server, it may be possible to take up all these resources by flooding the server with SYN messages. Once all resources set aside for half-open connections are reserved, no new connections (legitimate or not) can be made, resulting in denial of service. Some systems may malfunction badly or even crash if other operating system functions are starved of resources this way