Underground: Hacking, madness and obsession on the electronic frontier - novelonlinefull.com
You’re read light novel Underground: Hacking, madness and obsession on the electronic frontier Part 74 online at NovelOnlineFull.com. Please use the follow button to get notification about the latest chapter next time when you visit NovelOnlineFull.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy
HEPNET High Energy Physics Network: DECNET-based network, primarily controlled by DOE, connected to NASA's SPAN
IID Internal Investigations Division. Both the Victoria Police and the AFP have an IID
IP Internet Protocol (RFC791): a data communications protocol, used to transmit packets of data between computers on the Internet
IS International Subversive (electronic magazine)
ISU Internal Security Unit: anti-corruption unit of the Victoria Police
ITU International Telecommunications Union, the international telecommunications standards body
JANET Joint Academic Network (UK), a network of computers
JPL Jet Propulsion Laboratory--a California-based NASA research centre affiliated with CalTech
LLNL Lawrence Livermore National Laboratory (US)
LOD Legion of Doom
Lutzifer West German computer, connected to the X.25 network, which had a chat facility
MFC Multi Frequency Code (Group III): inter-exchange telecommunications system used by Telstra (Telecom)
MILNET Military Network: TCP/IP uncla.s.sified US DOD computer network
MOD Masters of Deception (or Destruction)
Modem Modulator De-modulator: a device used to transmit computer data over a regular telephone line
NCA National Crime Authority
Netlink A Primos/Dialcom command used to initiate a connection over an X.25 network
NIST National Inst.i.tute of Standards (US)
NIC Network Information Center (US), run by DOD: a computer which a.s.signed domain names for the Internet.
NRL Naval Research Laboratory (US)
NSA National Security Agency (US)
NUA Network User Address: the 'telephone' number of a computer on an X.25 network
NUI Network User Identifier (or Identification): combined username/pa.s.sword used on X.25 networks for billing purposes
NorTel Northern Telecom, Canadian manufacturer of telecommunications equipment
PABX Private Automatic Branch Exchange
PAD Packet a.s.sembler Disa.s.sembler--ASCII gateway to X.25 networks
PAR 'PAR?'--command on PAD to display PAD parameters
RMIT Royal Melbourne Inst.i.tute of Technology
RTG Radioisotope Thermoelectric Generator, s.p.a.ce probe Galileo's plutonium-based power system
RTM Robert Tappan Morris (Jr), the Cornell University student who wrote the Internet worm, also known as the RTM worm
Scanner A program which scans and compiles information, such as a list of NUAs
SPAN s.p.a.ce Physics a.n.a.lysis Network: global DECNET- based network, primarily controlled by NASA
Sprint US telecommunications company, an X.25 network provider
Sprinter Word used by some Australian and English hackers to denote scanner. Derived from scanning attacks on Sprint communications
Sprintnet X.25 network controlled by Sprint communications
Sun Sun Microsystems--a major producer of Unix workstations
TCP Transmission Control Protocol (RFC793): a standard for data connection between two computers on the Internet
TELENET An X.25 network, DNIC 3110
Telnet A method of connection between two computers on the Internet or other TCP/IP networks
Trojan A program installed by hackers to secretly gather information, such as pa.s.swords. Can also be a backdoor
Tymnet An X.25 network controlled by MCI, DNIC 3106
Unix Multi-user computer operating system developed by AT&T and Berkeley CSRG
VAX Virtual Address Extension: series of mini/mainframe computer systems produced by DEC
VMS Virtual Memory System: computer operating system produced by DEC and used on its VAX machines
w.a.n.k Worms Against Nuclear Killers: the t.i.tle of DECNET/VMS-based worm released into SPAN/DEC/HEPNET in 1989
X.25 International data communications network, using the X.25 communications protocol. Network is run primarily by major telecommunications companies. Based on CCITT standard # X.25
Zardoz A restricted computer security mailing list
Notes.
Chapter 1
1. Words And Music by Rob Hirst/Martin Rotsey/James Moginie/Peter Garrett/Peter Gifford. (c) Copyright 1982 Sprint Music. Administered for the World--Warner/ Chappell Music Australia Pty Ltd. Used By Permission.