Product specifications
Revision 1.4
TCP/IP Transmission Control Protocol /Internet Protocol is a reliable,
full duplex, connection oriented end-to-end transport protocol running
on top of IP.
Teardrop Attack An attack that occurs when a malicious person sends
instructions over a network attempting to crash the server. Some imple-
mentations of the TCP/IP fragmentation re-assembly code do not prop-
erly handle overlapping IP fragments. Teardrop is a widely available
attack tool that exploits this vulnerability.
Telecommuter A person who performs work at home while linked to
the office by means of a telecommunications equipped
computer system.
Telnet A program that allows you to connect to other computers on the
Internet. The process by which a person using one computer can sign
onto another computer in an alternative location. Telnet is the terminal-
remote host protocol developed for ARPAnet. Using Telnet, you can
work from your PC as if it was a terminal attached to another computer
by a hard-wired connection.
TFTP Trivial File Transfer Protocol is a simplified version of FTP that
transfers files, but does not provide password protection or user-directo-
ry capability. It is associated with the TCP/IP family of protocols. TFTP
depends on the connectionless datagram delivery service, UDP.
Topology The physical network layout or flow of data over a network,
including the various hubs or other network devices.
Trojan Horse Generic name for a virus or security violating program
that is disguised as something else, like a Directory Lister, or Archiver.
A Trojan horse could be software that appears to do something normal,
but contains a trap door or attack program.
Glossary Of Terms
Additional
Information
Powered By AlphaShield 43
version 1.5.qxd 06/05/2003 15:55 Page 43