Data Encryption Standard (DES) is a cipher, ie, a method for encrypting data, chosen as a FIPS standard in the United States in 1976, and whose use is widespread throughout the world. The algorithm was initially controversial with classified design elements of a relatively short key length, and suspicions about the continued existence of a backdoor for the National Security Agency (NSA). DES was subsequently subjected to intense academic analysis and led to the modern concept of block cipher and its cryptanalysis.
ETHERNET
Ethernet (pronounced / iːθərnɛt /) is a standard for local area networks for computers with access to the means for detecting the carrier wave with collision detection (CSMA / CD). Its name comes from the physical concept of ether. Ethernet defines wiring and signaling characteristics of physical layer and formats data frame data link layer of the OSI model.
Ethernet (pronounced / iːθərnɛt /) is a standard for local area networks for computers with access to the means for detecting the carrier wave with collision detection (CSMA / CD). Its name comes from the physical concept of ether. Ethernet defines wiring and signaling characteristics of physical layer and formats data frame data link layer of the OSI model.
. FDDI
Distributed Data Interface Fiber (FDDI: Fiber Distributed Data Interface) are a set of ISO and ANSI standards for data transmission in computer networks local or wide area network (LAN) via fiber optic cable. It is based on token ring architecture and allows full duplex communication type. Since it may cater to thousands of users, an FDDI LAN is often used as backbone for wide area network (WAN).
FINGER
FIREWALL
A firewall is a device that acts as a firewall between networks, allowing or denying the transmissions from one network to another. A typical use is to place it between a local network and the Internet, as a safety device to prevent intruders from accessing confidential information.
A firewal is simply a filter that controls all communications passing from one network to the other and depending on what you are allowed or denied passage
Distributed Data Interface Fiber (FDDI: Fiber Distributed Data Interface) are a set of ISO and ANSI standards for data transmission in computer networks local or wide area network (LAN) via fiber optic cable. It is based on token ring architecture and allows full duplex communication type. Since it may cater to thousands of users, an FDDI LAN is often used as backbone for wide area network (WAN).
FINGER
Finger in computing, a protocol that provides information to users on
a machine.
A firewall is a device that acts as a firewall between networks, allowing or denying the transmissions from one network to another. A typical use is to place it between a local network and the Internet, as a safety device to prevent intruders from accessing confidential information.
A firewal is simply a filter that controls all communications passing from one network to the other and depending on what you are allowed or denied passage

A technology that inspects incoming packets of information before allowing it to join the network.
FIRMWARE
Firmware is a block of machine instructions for specific purposes, recorded in a memory, typically read / write (ROM, EEPROM, flash, etc.), which establishes the lowest level logic that controls the electronics of a device of any kind. It is tightly integrated with the electronic device being software that has direct interaction with the hardware: the manager with to properly execute remote commands.
. FRAGMENTATION
We have seen that the physical frames have a data field and that is where IP datagrams are transported. However, this data field can not have an indefinite length because it is limited by the design of the network. The MTU of a network is the largest amount of data that can transport your physical frame. The MTU of Ethernet networks is 1500 bytes and the Token-Ring networks 8192 bytes. This means that an Ethernet network can never convey a datagram larger than 1500 bytes without fragmenting.
FTP
FTP (short for File Transfer Protocol, 'File Transfer Protocol') in computing is a network protocol for transferring files between computers connected to a TCP (Transmission Control Protocol), client-based architecture server. From a client computer can connect to a server to download files from it or to send files, regardless of operating system used on each computer.
FULL DUPLEX
Duplex is a term used in telecommunications to define a system that is capable of maintaining two-way communication, sending and receiving messages for simultánea.1 The ability to transmit duplex mode is conditional on several levels:
Physical environment (able to pass in both directions)
Transmission system (capable of sending and receiving at the same time)
Or standard communication protocol used by the terminal equipment
GATEWAY.
A gateway, gateway or gateway is a device that allows to interconnect networks with different architectures and protocols at all levels of communication. Its purpose is to translate the information from the protocol used in an initial protocol used on the network destination network.
HACKER

A hacker is someone who discovers the weaknesses of a computer or a computer network, although the term can also apply to someone with advanced knowledge of computers and networks informáticas.1 Hackers may be motivated by a multitude of reasons
including
late profit, protest or the desafío.2 the
subculture that has evolved around
hackers is often referred to the underground culture of computers, but is now an open community.
HALF DUPLEX Duplex is a term used in telecommunications to define a system that is capable of maintaining two-way communication, sending and receiving messages for simultánea.1 The ability to transmit duplex mode is conditional on several levels:
Physical environment (able to pass in both directions)
Transmission system (capable of sending and receiving at the same time)
Or standard communication protocol used by the terminal equipment

HOME
In text editors for Windows and Linux, the Home key or Home key is mainly used to return the cursor to the beginning of the line where the cursor is located. When the text is not editable, the Home key is used to return to the top of the document (this can also be done in editable text, if CTRL + Home key is presionata).
HTTP
Hypertext Transfer Protocol, or HTTP (in Spanish Hypertext Transfer Protocol) is the protocol used in each transaction of the World Wide Web. HTTP was developed by the World Wide Web Consortium and the Internet Engineering Task Force, a collaboration that culminated in 1999 with the publication of a series of RFCs, the most important of which is RFC 2616, which specifies the version 1.1. HTTP defines the syntax and semantics using the software elements of the web architecture (clients, servers, proxies) to communicate. It is a transaction-oriented and follows the request-response between a client and server protocol scheme. The client making the request (a web browser or spider) is known as "user agent" (user agent). The information transmitted is called resource and is identified by a Uniform Resource Locator (URL). Resources can be files, the result of the execution of a program, a query to a database, the automatic translation of a document, etc
HUB
Hub hub means, it is a device used in local area networks (LAN - Local Area Network), a local network is one that has a relatively nearby computers interconnected by wires. The primary role of the Hub is to concentrate terminals (other client computers) and repeat the signal it receives from all ports and all computers and listen to it and you can define and send them information corresponds to all what is required; are the basis for creating star-like networks.
ETHERNET
Ethernet (pronounced / iːθərnɛt /) is a standard for local area networks for computers with access to the means for detecting the carrier wave with collision detection (CSMA / CD). Its name comes from the physical concept of ether. Ethernet defines wiring and signaling characteristics of physical layer and formats data frame data link layer of the OSI model.
INTRANET
An intranet is a computer network that uses Internet Protocol technology to share information, operating systems and computing services within an organization. This term is used in contrast to Extranet, a network between organizations, and instead refers to a network within an organization. Sometimes the term refers only to the internal organization of the website, but may be a more extensive part of the infrastructure of information technology in the organization, and may be composed of several LANs. The goal is to arrange the desktop of each individual with minimal cost, time and effort to become more productive, profitable, timely and competitive.
IEEE
The
Institute of Electrical and Engineering electronics1 -abreviado as IEEE , read
I- Triple -e in Latin America or in Spain ie- cube ; English Institute of
Electrical and Electronics Engineers -1 is a global association of engineers
and technicians dedicated to the standardization and development in areas
técnicas.1 With nearly 425,000 members and volunteers in 160 countries, 2 3 is
the largest international association profit organization formed by
professionals of new technologies , such as electrical engineers, electrical
engineers , computer scientists , computer engineers , applied mathematicians ,
biomedical engineers , telecommunications engineers , mechatronics engineers ,
etc.
INFRASTRUCTURE
Good infrastructure can mean quick access to online technology, less downtime, greater flexibility in mail processing and generally PCs that run smoothly. An infrastructure in which they can depend on can also ensure the success of any change in future technologies. It makes no sense to develop a sophisticated Intranet to share information for decision making within the business, if the network is paralyzed when users try to access.
INFRASTRUCTURE MODE
Configuration in which a wireless network connected to a wired network via an access point.
. INTERVAL INDICATOR
Network Time Protocol (NTP) is an Internet protocol for synchronizing the clocks of computer systems over packet routing networks with jitter. NTP uses UDP as its transport layer, using port 123. It is designed to resist the effects of variable latency.
INTERNET
Internet is a decentralized set of interconnected communications networks that use family TCP / IP protocol, which guarantees that the heterogeneous physical networks that comprise function as a single logical network, worldwide. Its origins date back to 1969 when the first connection of computers, known as Arpanet, three universities in California and one in Utah, United States was established.
IP
stands for Internet Protocol, or in our language, the Internet Protocol. This is a standard that is used for sending and receiving information through a packet switched network that brings.
IP ADDRESS
The so-called IP addresses (or IP Address as are mentioned in English) is a number that can recognize a logic structure and respecting hierarchy to a particular computer interface (as it may be a computer) in the context of a network that works using the IP (Internet protocol corresponding acronym), which is equivalent to the network scale or level 3 of the OSI reference model
.
IPCONFIG
Microsoft Windows is ipconfig in a console application that displays the settings of TCP / IP and updates the current configuration of DHCP and Domain Name System (DNS). There are also GUI tools called winipcfg wntipcfg. The role of these tools is similar to the different ifconfig implementations on UNIX and UNIX-like operating systems.
IPSEC
IPsec (short for Internet Protocol security) is a suite of protocols used to secure communications over Internet Protocol (IP) authenticating and / or encrypting each IP packet in a data stream. IPsec also includes protocols for establishing encryption keys.
INFRASTRUCTURE
Good infrastructure can mean quick access to online technology, less downtime, greater flexibility in mail processing and generally PCs that run smoothly. An infrastructure in which they can depend on can also ensure the success of any change in future technologies. It makes no sense to develop a sophisticated Intranet to share information for decision making within the business, if the network is paralyzed when users try to access.
INFRASTRUCTURE MODE
Configuration in which a wireless network connected to a wired network via an access point.
. INTERVAL INDICATOR
Network Time Protocol (NTP) is an Internet protocol for synchronizing the clocks of computer systems over packet routing networks with jitter. NTP uses UDP as its transport layer, using port 123. It is designed to resist the effects of variable latency.
INTERNET
Internet is a decentralized set of interconnected communications networks that use family TCP / IP protocol, which guarantees that the heterogeneous physical networks that comprise function as a single logical network, worldwide. Its origins date back to 1969 when the first connection of computers, known as Arpanet, three universities in California and one in Utah, United States was established.
IP
stands for Internet Protocol, or in our language, the Internet Protocol. This is a standard that is used for sending and receiving information through a packet switched network that brings.
IP ADDRESS
The so-called IP addresses (or IP Address as are mentioned in English) is a number that can recognize a logic structure and respecting hierarchy to a particular computer interface (as it may be a computer) in the context of a network that works using the IP (Internet protocol corresponding acronym), which is equivalent to the network scale or level 3 of the OSI reference model
.
IPCONFIG
Microsoft Windows is ipconfig in a console application that displays the settings of TCP / IP and updates the current configuration of DHCP and Domain Name System (DNS). There are also GUI tools called winipcfg wntipcfg. The role of these tools is similar to the different ifconfig implementations on UNIX and UNIX-like operating systems.
IPSEC
IPsec (short for Internet Protocol security) is a suite of protocols used to secure communications over Internet Protocol (IP) authenticating and / or encrypting each IP packet in a data stream. IPsec also includes protocols for establishing encryption keys.
ISM BAND
ISM (Industrial, Scientific and Medical) are reserved internationally for non-commercial use of RF electromagnetic industrial, scientific and medical areas band. Currently these bands have been popularized by its use in WLAN communications (eg Wi-Fi) or WPAN (eg Bluetooth).
The ISM bands were defined by the ITU in Article 5 of the Radio Regulations (RR), 1 specifically 5.138 and 5.150 points
ISP
ISP refers to the English acronym for Internet Services Provider. His Spanish translation allows us to understand quickly and easily what is an ISP; Service Provider or Internet access. The ISPs are also called IAPs, which also corresponds to the acronym in English, in this case for Internet Access Providers, which translated into Spanish, it is understood as Internet Access Providers.
. LINK
A bond or link is text or images on a website that a user can click to access or connect to another document. Links are like the technology that connects two sites or two websites. In the browser appear as underlined words (such as To the list of FAQ's at the bottom of this page).
LATENCY
Latency computer. Time it takes for data to become available since the request is made. It can be compared with the reaction time. It is measured in nanoseconds (ns) or milliseconds (ms). The less latency, the better.
. LAYER
Abstraction layers, layer or level. It is a way to hide
the implementation details of a particular set of functionality. Perhaps the
most popular software models using abstraction layers are OSI Layer 7 (protocol
model for computer networks), OpenGL charting library, and model byte stream I
/ O originated in Unix. // In computer architecture, a computer system is
usually represented with five levels (layers) of abstraction: hardware,
firmware, assembler, operating system and processes. // (Layer) in 2D plotting
a layer or layer is where the graph without affecting other layers. Are
overlapped to achieve a complete graph. This method is used, for example, in
Flash.
LAN
LANs can be connected to each other via telephone
lines and radio waves. A system of LANs connected in this way is called a WAN,
English acronym wide-area network, wide area network.
LEAP
LEAP uses a username and password, and supports
dynamic WEP key. As a CISCO proprietary technology, requires that the equipment
be Cisco and the RADIUS server to support LEAP.
LOAD
LOAD BIOS DEFAULTS: load a set of default values
with little or no optimization, generally useful to return to a certain
starting position and resolve problems encountered when starting.
MAC
MAN
MAN stands for Metropolitan Area Network, which
translates Metropolitan Area Network. A MAN network is one that, through a
high-speed connection, provides coverage over a large geographical area (like a
city or municipality).
With a network MAN can share and exchange all kinds of
data (text, video, audio, etc.) via fiber optic or twisted pair cable. This
type of network is an evolution of the LAN (Local Area Network and Local Area
Network), as it encourages interconnection in a wider region, covering a larger
area. On the other side is the WAN (Wide Area Network or Wide Area Network)
network, which allows the interconnection of countries and continents.
MBPS
Mbps or Mbit / s is an acronym that was developed to
identify the unit of one megabit per second, which is used to quantify a data
rate equal to 1,000 kilobits per second or 1,000,000 bits per second.
Importantly, this magnitude is not a speed, because the speed at which data is
transmitted has nothing to do with the flow or the flow of information. For
example, a radio signal can propagate information provided to the speed of
light, regardless of whether to transmit a flow of 1 kb / s to 1 Mb / s.
MIRC
mIRC is the most widespread platforms for Microsoft
Windows IRC client.
Its author is Khaled Mardam-Bey.
mIRC is shareware software license and your evaluation
period is 30 days (the latest version is 45 days). After the evaluation period
to continue using the program must pay a $ 20 license valid for any new version
of mIRC. If the license is not paid by the program is not actually disabled,
just have to wait a short time each time it runs before use.
MULTICAST
IP Multicast is a method for transmitting IP datagrams
to a group of interested receivers. You can view the article multicast for a
general discussion of the matter. This article deals specifically with IP
multicasting.
No hay comentarios:
Publicar un comentario