Define the Following
Results 1 to 4 of 4

Thread: Define the Following

  1. #1
    Junior Member
    Join Date
    Mar 2002
    Posts
    13

    Define the Following

    Does any one know what the following are:

    - Dod D-base
    - Logic Bomb
    - Password Sniffer
    - Worm
    - Cipher
    - Vernam Encryption
    - Ds-3 Connection
    - Central Encryption
    - Network IP Range
    - IDS Logs
    - Internal Clock
    - Back Door
    - Torjan Horse
    - Keylogger

    And what the following stand for:

    - Dun
    - TCP
    - IP
    - CSS
    - Dword
    - SSl
    - DES
    - RSA
    - PGP
    - BIOS
    - CISCO
    - AT
    - ATH0
    - ISP
    - TTL
    - UDP
    - ICMP
    - SYN

    PLease help Thanks!
    Welcome Yousefj32uk

  2. #2
    Senior Member
    Join Date
    May 2002
    Posts
    101
    Simple look it all up on www.google.com Best help you can get is read about it yourself. You will learn more.

  3. #3
    Member
    Join Date
    May 2002
    Posts
    74
    Looks like a definitions list for a school project.

    Take a look at the Jargon Dept on the site, it should have most of your answers.

    http://www.antionline.com/jargon/
    The more I deal with people, the more I LOVE my computer.

  4. #4
    Dod D-base is a database program. http://www.dbase.com/mainpage.htm

    Logic Bomb- http://searchsecurity.techtarget.com...815177,00.html

    Password Sniffer- A trojan horse that listens (usually) on a low port. Also see "packet sniffer"

    Worm-Code that replicates over a network but does not append itself to binaries/executables.

    Cipher- http://searchsecurity.techtarget.com...213593,00.html

    Vernam Encryption- http://www.geocities.com/zabrodskyvlada/aat/a_bitw.html

    DS-3 Connection-http://public.pacbell.net/dedicated/ds3/

    Central Encryption- http://www.commandprompt.com/ppbook/c15679.htm

    Network IP Range- http://muse.jhu.edu/proj_descrip/domains.html

    IDS Logs- http://www.nwfusion.com/news/2001/1011secfocus.html

    Internal Clock- http://www.loblolly.net/~rddecker/he...ystemclock.htm

    Backdoors and trojans are basically the same thing.- http://www.irchelp.org/irchelp/security/trojan.html

    Keylogger- records everything you type. Can be a standalone application or part of a trojan.backdoor.

    DUN: Dial Up Networking
    TCP- Transmission Control Protocol http://www.webopedia.com/TERM/T/TCP.html
    IP- Internet Protocol http://www.webopedia.com/TERM/I/IP.html
    CSS- Cascading Style Sheets http://www.webopedia.com/TERM/C/CSS.html
    DWORD- is 32 bits long. See the awesome Art Of Assmebly page here for everything you ever wanted to know about data representation...http://webster.cs.ucr.edu/Page_asm/A...ml#HEADING1-30
    SSI- Server Side Include
    DES-Data Encryption Standard http://www.tropsoft.com/strongenc/des.htm
    RSA- is a public key encryption designed by RSA Data Security, Inc. http://www.webopedia.com/TERM/R/RSA.html
    PGP- Pretty Good Privacy developed by Phil Zimmerman http://www.pgpi.org/
    BIOS- Basic Input Output System
    CISCO- http://www.faqs.org/faqs/cisco-netwo...section-3.html could, or could not be true...
    AT- Is a form factor for motherboards http://www.pcguide.com/ref/mbsys/mobo/formAT-c.html
    ATH0- From what I can recall, modem disconnect??
    ISP- Internet Service Provider
    TTL- Time To Live http://www.webopedia.com/TERM/T/TTL.html
    UDP-User Datagram Protocol http://www.webopedia.com/TERM/U/UDP.html
    ICMP- Internet Control Message Protocol http://www.webopedia.com/TERM/I/ICMP.html
    SYN- SYN is one stage in the communication sequence TCP uses for establishing
    connections. Also look up ACK.

    All of this was found using www.google.com .It's an awesome too. Try it, you might like it

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •