A person who carries out hacking on a computer software program.
The process of deconstructing computer software in an effort to understand how it works and to improve it.
A connection in which data is transmitted in both directions, but not simultaneously. Compare with full-duplex.
The initial communication between two data communication devices, during which they agree on protocol and transfer rules for the session.
The hardware-encoded MAC address that is burned into every NIC.
A device that is plugged into an interface for the purposes of simulating a network connection and thus enabling the interface to be tested as if it is operating while connected.
A version of Token Ring that has a maximum speed of 100Mbps. This is in contrast with other Token Ring standards, which have maximum speeds of 4Mbps or 16Mbps.
The means by which routing protocols determine the shortest way to reach a given destination. Each router constitutes one hop; so if a router is four hops away from another router, there are three routers, or hops, between itself and the destination. In some cases, the final step is also counted as a hop.
Any computer system on a network. In the Unix world, any device that is assigned an IP address.
An identifier that is used to uniquely identify a client or resource on a network.
A name that is assigned to a system for the purposes of identifying it on the network in a more user-friendly manner than by the network address.
A text file that contains hostname-to-IP address mappings. All commonly used platforms accommodate static name resolution using the HOSTS file.
A disaster-recovery term used to describe a site that can be immediately functional in the event of a disaster at the primary site.
In a RAID configuration, a drive that sits idle until another drive in the RAID array fails, at which point the hot spare takes over the role of the failed drive.
The removal and replacement of a component in a system while the power is still on and the system is functioning.
The network standard for high-speed serial communications over WAN links. It includes Frame Relay, T1, T3, E1, and ISDN.
A protocol that is used by Web browsers to transfer pages and files from the remote node to the user's computer.
A protocol that performs the same function as HTTP but does so over an encrypted link, ensuring the confidentiality of any data that is uploaded or downloaded. Also referred to as S-HTTP.
A hardware device that acts as a connection point on a network that uses twisted-pair cable. Also known as a concentrator or a multiport repeater.
A Windows-based communications program that allows users to establish host/shell access to a remote system.