See wide area network (WAN).
Driving around with a laptop looking for open wireless access points with which to communicate.
A site that provides some capabilities in the event of a disaster. The organization that wants to use a warm site will need to install, configure, and reestablish operations on systems that might already exist in the warm site.
A cipher hole that can be exploited.
An attack that looks for cipher holes.
A type of proxy that is used to act on behalf of a web client or web server.
A server that holds and delivers web pages and other web content using HTTP. See also Hypertext Transfer Protocol (HTTP).
See Wired Equivalent Privacy (WEP).
A network that crosses local, regional, and/or international boundaries.
See Wireless Fidelity (Wi-Fi).
A Network Basic Input Output System (NetBIOS) name resolution service employed in Windows networks. Windows Internet Naming Service (WINS) translates hostnames into network addresses.
A type of Windows program (a file with either an .exe or a .dll filename extension) that is loaded automatically by the server or manually by the administrator.
A Microsoft API used to interact with TCP/IP.
A Windows-based attack that affects only computers running Windows NT 3.51 or 4. It's caused by the way the Windows NT TCP/IP stack handles bad data in the TCP header. Instead of returning an error code or rejecting the bad data, it sends NT to the Blue Screen of Death (BSOD). Figuratively speaking, the attack "nukes" the computer.
A security protocol for 802.11b (wireless) networks that attempts to establish the same security for them as would be present in a wired network.
A wireless bridge used in a multipoint radio frequency (RF) network.
A bridge that performs all the functions of a regular bridge but uses RF instead of cables to transmit signals.
An 802.11b or 802.11g wireless network operating in the 2.4Ghz or 5Hhz frequency range.
A local area network that employs wireless access points (WAPs) and clients using the 802.11 standards.
The primary method of connecting a wireless device to a network.
Technologies employing wireless communications.
The security layer of the Wireless Applications Protocol (WAP). WTLS provides authentication, encryption, and data integrity for wireless devices.
See wireless local area network (WLAN).
An estimate of the amount of time and effort that would be needed to break a system.
A specific group of users or network devices, organized by job function or proximity to shared resources.
The copy of the data currently in use on a network.
A computer that isn't a server but is on a network. Generally, a workstation is used to do work, whereas a server is used to store data or perform a network function.
An association concerned with interoperability, growth, and standardization of the World Wide Web (WWW). This group is the primary sponsor of XML and other web-enabled technologies.
A program similar to a virus. Worms, however, propagate themselves over a network. See also virus.
18.116.59.8