70 SOHOware
®
Secure Cable/DSL Router
TCP/IP protocols are used for Internet communications and consist of:
TCP (Transmission Control Protocol), which uses a set of rules to exchange
messages with other Internet points
IP (Internet Protocol), which uses a set of rules to identify Internet addresses
on the Internet. Every computer on the Internet has a unique IP address. The
IP protocol helps Internet users to identify each sender or receiver of
information that is sent across the Internet
VPN
Virtual Private Network: The use of encryption in the lower protocol layers to
provide a secure connection through an otherwise insecure network, typically the
Internet.
BBS (Bulletin Board Service)
A computer and associated software that typically provides an electronic message
database where people can log in and leave messages. Apart from public message
areas, a BBS may provide archives of files, personal electronic mail, and any other
services or activities of interest to the bulletin board's system operator (the
"sysop").
News Forum
An electronic meeting place where people can exchange news or discuss common
interests.
Hacker
A person who enjoys exploring the details of programmable systems and how to
stretch their capabilities, as opposed to most users, who prefer to learn only the
minimum necessary. Recently misused to describe a Cracker. See the next item.
Cracker
An individual who attempts to gain unauthorized access to a computer system.
These individuals are often malicious. Contrary to widespread myth, cracking does
not usually involve some mysterious leap of hackerly brilliance, but rather
persistence and the dogged repetition of a handful of fairly well-known tricks that
exploit common weaknesses in the security of target systems.
Firmware
Software stored in read-only memory (ROM) or programmable ROM (PROM).
Easier to change than hardware, but harder than software stored on disk. Firmware
is often responsible for the behavior of a system when it is first switched on.