Skip to main content

Internet Terminology


ASYMMETRIC COMMUNICATIONS:
Asymmetric communication refers to the type of communication in which the speed or quality of data transfer is different in both the directions. This usually happens when browsing the Internet. The traffic coming into the user's system is very high as compared to the traffic leaving the system. In the case of symmetric communication, the transfer speed in both the directions is the same. This occurs when people communicate through video conferences or the telephone.

NUKING:
Nuking is a hacker's technique of causing the Windows operating system to crash, or suddenly terminate by using malicious network data packets. An out of band network packet that the operating system can't process is sent to the target system. This packet is called a 'blue bomb', or 'WinNuke' when Windows crashes, you see the dreaded BSOD (blue screen of death). Blue bombs are sometimes sent by multiplayer gamers about to lose a game, or by an IRC (Internet Relay Chat) user, as a show of superiority.

PHREAKING:

Hacking a phone system with the help of a computer, in order to make free calls, or charge your calls to someone else is called phreaking. This illegal activity is mainly done by computer electronics hobbyists, out of sheer curiosity, or just to save money on long distance calls. A person who actively enjoys phreaking is known as phreak or phreaker. The tools used by a phreaker are electronic devices known as boxes the black box, red box, beige box and clear box.

SPOOFING:
Spoofing is a forgery of an e mail so that the message appears to have been delivered from someone or somewhere other than the original source. The header of the email is modified in a way that the email doesn't contain information about the original sender and the address from where it was sent. The main protocol used for sending e mail, Simple Mail Transfer Protocol (SMTP), does not include any sort of authentication mechanism. This is why spoofing can be widely used on the net. Spammers often use spoofing to get recipients to open.


NETIQUETTE:

The word netiquette has been coined from the two words Network and Etiquette. Etiquette can be described as a set of rules or guidelines, which define socially acceptable behaviour. So to put it simply, netiquette is etiquette for online communication. Netiquette comprises an informal code of conduct, general dos and don'ts which should be observed. Keep in mind that online communication may be through a computer, but it is still between real people, so common courtesy and understanding should be observed. There are some additional things to keep in mind. For example typing in all capitals, gives the impression of shouting, and is thus rude. Spam is also a definite NO.

DYNAMIC HOST CONTROL PROTOCOL:

Every computer system on a TCP/IP network is assigned a unique address known as IP address to identify a computer on the network. As the network grows, the network administrator has to keep track of the addresses given to the systems. This becomes even more complex when systems are added or removed from the network. Hence, DHCP is used to dynamically assign IP addresses to computers on a network. Instead of the network administrator, a DHCP server keeps track of the IP addresses assigned. Hence, a system joining a network is assigned an IP address from an IP pool. That IP address is retrieved back to the pool when the system is removed. The IP address assigned to a system changes every time it boots up and gets connected to the network.

HOP:
In a packet switching network, a message is broken down into packets and transmitted over the network. This packet travels through several routers before reaching the destination node. The number of routers that the packet passes through is known as the hop count. This information is added to the packet header once it crosses a router. A packet with a higher hop count takes more time to reach its destination, and packets with extremely high hop counts are removed from the network, as it could be a stray packet wandering around the location.

For More Details Check ::
netlingo
webopedia

Comments

Popular posts from this blog

T Shirt Quotes related to Computers

Last week while searching for some computer related quotes for T Shirt I came across certain quotes that I thought were very good.So I thought why not share these quotes with you.So here are these quotes,pick the one you like or if you have any of your favorites then do share it with us.Here is the list.. "Programmers don't byte, they nibble a bit" "To iterate is human, to recurse divine" " first 90% of the code accounts for the first 90% of the development time. The remaining 10% of the code accounts for the other 90% of the development time" "99% of all girls are beautiful, the rest 1% are in my college "ASC!! a stupid question,get a stupid ANS!" "In cartooned form Atom1 - I have lost an electron. Atom2 - Are you sure? Atom1 - I am positive." "There's no place like 127.0.0.1 (“Home” for the non-geeks)" "YouTube(logo) myspace(logo) and I'll Google(logo) your Yahoo(logo)." " I'm a progr...

Google Facts

The name Google is a spelling error. The founders of the site, Larry page and Sergey Brin , thought they were going for Googol .. Googol is the mathematical term for 1 followed by 100 zeros. Initially, Larry and Sergey Brin called their search engine BackRub , named for its analysis of the of the web's "back links." The reason the google page is so bare is because t he founder didn't know HTML and just wanted a quick interface. The company's first office was in a garage , in Menlo Park, California . Google's first employee was Craig Silverstein, now Google's Director of technology. The basis of Google's search technology is called PageRank that assigns a rank to determine how useful it is. However, that is not why it is called PageRank. It is actually named after Google co-founder Larry Page . It would take 5,707 years for a person to search Google's 3 billion pages . The Google software does it in 0.5 seconds. The logos that appear on ...

Computer Tips Bollywood Style

After a long gap I am writing a post...back in the blogger arena after such a long interval feels good.Here are some tips... As they say "A picture is worth a thousand words". TecH GaraGe (TG) is back with a new flavour in a new attire.Keep checking out this blog.