reviews shortcuts
|
List of netowrking, wireless, broadband, satellite, telephony, general computing and other technical terms used throughout the site.
| All
| # | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
Term |
Description |
WoWLAN |
WoWLAN (Wake on Wireless LAN) is a standard that allows a computer to be turned on or awakened by a wireless network message by another device on the same local network. |
WPA |
WPA (WiFi Protected Access) is a wireless standard designed to improve upon the security features of WEP. It is designed to work with existing WiFi products (as a software upgrade to existing WEP-capable hardware).
The two improvements over WEP are:
1. Improved data encryption through TKIP (temporal key integrity protocol), which hashes/scrambles the keys and adds an iintegrity-check, ensuring the keys haven't been tampered with.
2. User authentication through EAP (extensible authentication protocol).
WPA takes two forms; WPA Enterprise Mode and WPA Personal, or PSK (Pre-Shared Key) Mode. WPA PSK is somewhat more vulnerable to attacks: a cracker passively intercepting initial key exchange messages can then possibly crack poorly chosen short passphrases with a robust dictionary attack offline and without access to the network.
WPA-Enterprise is an encryption method that protects unauthorized network access by verifying network users through a server.
WPA-Personal is an encryption method that protects unauthorized network access by utilizing a set-up password.
Note: WPA is an interim standard being replaced with the IEEE's now ratified 802.11i standard, branded WPA2. |
WPA2 |
WPA2 is the follow up to the Alliance's interim security plan, WPA (Wi-Fi Protected Access). WPA2 is based on the ratified IEEE 802.11i standard, and provides government grade security by implementing the NIST FIPS 140-2 compliant AES encryption algorithm. WPA2 provides network administrators with a high level of assurance that only authorized users can access the network.
WPA2 can be enabled in two versions: WPA2 - Personal and WPA2 - Enterprise. WPA2 - Personal protects unauthorized network access by utilizing a set-up password. WPA2 - Enterprise verifies network users through a server. WPA2 is backward compatible with WPA.
|
WPS |
WPS (Wi-Fi Protected Setup) is a wireless security standard that provides non-technical users with a simple method of securing their wireless network.
The most common implementation includes pushing a physical button on a wireless router/access point. In addition, WPS-certified devices also support an 8-digit PIN, usually printed on a sticker on the device itself for authentication.
Recently (as of December 2011), flaws in WPS have been discovered that affect most major vendors and allow an attacker to crack the WPS PIN within a couple of hours. The U.S. Computer Emergency Readiness Team (US-CERT) has notified vendors and issued an advisory that suggests turning off WPS as an workaround until a better solution is implemented. See vulnerability note VU#723755 |
WYSIWYG |
WYSIWYG (What You See Is What You Get, pronounced "wizzy-wig") refers to software that displays what your work will look like while you're creating it.
Sometimes also WYSINQWYG ;) (What You See Is Never Quite What You Get, pronounced "wizzin-quig"). |
xDSL |
DSL ( Digital Subscriber Line ) is a method of high-speed data transfer over ordinary copper telephone lines. xDSL refers to the different variations of DSL, such as ADSL, HDSL, SDSL and RADSL. |
XML |
XML (Extensible Markup Language) is a flexible way to create common information formats and share both the format and the data, most commonly on the web. It generally similar to HTML and helps share information in a consistent way. XML is "extensible" because, unlike HTML, the markup symbols are unlimited and self-defining. |
YAGI |
A Yagi antenna, or simply a Yagi, is a popular type of unidirectional antenna commonly used in communications above 10 MHz, such as Amateur radio, CB radio and some surgace satellite communications systems. A basic Yagi consists of three or more half-wave elements (one driven, one reflector, and one or more directors), and offers very high directivity and gain. |
YMMV |
Your Mileage May Vary |
ZSL |
ZSL (Zero Slot LAN) refers to a type of LAN that uses existing communication ports (serial, parallel, USB, etc.) rather than requiring NICs that occupy expansion slots on the networked computers.
ZSLs are typically slower than regular LANs and limited to a just a few network nodes. |
Term |
Description |
| All
| # | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
|
|
|