User's Manual
Prestige 100L IDSL Router
Glossary G
standards, denoted as NI2 and NI3, are currently being developed.
NIC
Network Interface Card. A board that provides network communication capabilities to
and from a computer system. Also called an adapter.
Node
Any single computer connected to a network.
NT-1 The NT-1 (Network Termination 1) is a device that is required to connect ISDN
terminal equipment to an ISDN line. The NT-1 connects to the two-wire line (twisted
pair copper wiring) that your telephone company has assigned for your ISDN service.
Your ISDN service does not work if the NT-1's plug is not connected to a working
electrical outlet.
Open
Architecture
Allows the system to be connected easily to devices and programs made by other
manufacturers. Open architectures use off-the-shelf components and conform to
approved drafts. A system with a closed architecture, on the other hand, is one
whose design is proprietary making it difficult to connect the system to other systems.
Packet Filter A filter that scans packets and decides whether to let them through.
PAP
Password Authentication Protocol (PAP) is a security protocol that requires users to
enter a password before accessing a secure system. The user’s name and password
are sent over the wire to a server, where they are compared with a database of user
account names and passwords. This technique is vulnerable to wiretapping
(eavesdropping) because the password can be captured and used by someone to
log onto the system.
Password
Cracker
A program that uses a dictionary of words, phrases, names, etc. to guess a
password.
Password
Encryption
A system of encrypting electronic files using a single key or password. Anyone who
knows the password can decrypt the file.
Password
Shadowing
The storage of a user's username and password in a network administrator
database.
PBX Private Branch eXchange is a small version of the phone company's larger central
switching office. A PBX is a private telephone switch. It is connected to groups of
lines from one or more central offices and to all of the telephones at the location
served by the PBX.
Ping Attack An attack that slows down the network until it is unusable. The attacker sends a
"ping" command to the network repeatedly to slow it down. See also Denial of
Service.
Pirate Someone who steals or distributes software without paying the legitimate owner for it.
This category of computer criminal includes several different types of illegal activities.
Making copies of software for others to use. Distributing pirated software over the
Internet or a Bulletin Board System. Receiving or downloading illegal copies of
software in any form.
Pirated
Software
Software that has been illegally copied, or that is being used in violation of the
software's licensing agreement. Pirated software is often distributed through pirate
bulletin boards or on the Internet. In the internet underground it is known as Warez.
Plain Text The opposite of Cipher Text, Plain Text is readable by anyone.
Point of
Demarcation
The physical point where the phone company ends its responsibility with the wiring of
the phone line.