Top

protonic.glossary

 
Please select from the following Glossary Categories:

General Terms

Security Terms

Virus Terms

Networking Terms

Acronyms / Abbreviations

  Networking Terms...Click the Term to view the Definition.  

  Domain Name System (DNS)
DNS translates Internet addresses,such as http://www.protonic.com, to an IP addresses (such as 208.215.179.146) so routers can find Web sites on the Internet. Usually, your ISP will provide you a primary and secondary DNS server address. You configure DNS in your computer?s network settings (or set it up on your DHCP server to automatically configure your computers and other network devices with DNS information).
  Dynamic Host Configuration Protocol (DHCP)
DHCP automatically assigns IP addresses to the devices on your network. You pre-configure a range of allowable IP addresses on a DHCP server (such as a router or computer) that runs on your network.
  Ethernet
Ethernet is a networking standard. Although there are other types of networks, Ethernet is by far the most common and is almost exclusively the only standard used in home networking. You will encounter this term frequently when shopping for various network hardware, such as routers, modems, and cables.
  Internet Protocol (IP) Address
Every device (for example, computers, printers, routers, and gaming consoles) on a network must have a unique address. An IP address consists of four sets of numbers from 0 to 255, separated by a decimal (for example, 192.168.1.200).
  Internet Service Provider (ISP)
An ISP provides Internet service to individuals and businesses. Typical options for high-speed Internet access include DSL and cable.
  Malware
Short for malicious software, malware is software code that is designed to damage files or entire computer systems, steal data, disrupt network, and do generally bad things to computers, networks, and people. Malware consists of viruses, worms, Trojans, spyware, adware, backdoors, rootkits, and bots.
  Phishing
Phishing (pronounced like fishing) E-Mails are a type of spam used by identity thieves to trick an individual into revealing private data, such as banking account information or passwords. Many phishing attempts appear to come from a legitimate sender such as your bank, and may even include authentic logos and links to the actual bank?s Web site (as well as other links that may install other malware or take you to a malicious Web site).
  Rootkit
A rootkit (or backdoor) is a program that allows an attacker to covertly gain access to your computer in order to steal data, do damage, or control your computer.
  Service Set Identifier (SSID)
An SSID uniquely identifies your wireless network and is broadcast by your wireless access point.
  Spyware
Spyware quietly collects information about users on your computer or network. Spyware can be used to monitor a computer user?s activities or even log keystrokes.
  Trojan
A Trojan is malware that masquerades as legitimate software. Once a Trojan has been installed on a computer, it can do extensive damage to a computer or network, including deleting files, stealing data, and installing other viruses.
  Virtual Private Network (VPN)
A VPN allows two networks to be connected securely over the Internet as if they were one network. For example, you might use a VPN to connect your home network to your corporate network (if your company permits you to connect to the office from home).
  Wi-Fi Protected Access (WPA and WPA2)
WPA and WPA2 are wireless security standards for protecting your wireless network and the data on your wireless network.
  Worm
A worm is similar to a virus, but does not require a host program or file and can replicate and infect computers with human action. Worms typically take advantage of a known vulnerability or bug in a computer program or operating system.