热区和窃用

发表于:2008-02-17来源:作者:点击数: 标签:热区和窃用
Hot Zone A hot zone is a wireless access area created by multiple hot spots located in close proximity to each other. Hot zones usually combine public safety access points with public hot spots. Each hot spot typically provides .net work ac
Hot Zone

  A hot zone is a wireless aclearcase/" target="_blank" >ccess area created by multiple hot spots located in close proximity to each other. Hot zones usually combine public safety access points with public hot spots. Each hot spot typically provides.network access for distances between 100 and 300 feet; various technologies, such as mesh network topologies and fiber optic backbones, are used in conjunction with the hot spots to create areas of coverage.

  热区

  热区是由多个相互靠得很近的热点组成的无线接入区域。热区通常将公共的安全接入点与公共的热点结合起来。每个热点一般提供 100至300英尺距离的网络接入,可以用不同的技术,如网状网技术和光纤骨干网技术,将热点连接起来形成覆盖区域。

  Snarf

  Initially, in the realm of programming languages, snarf meant to grab a large document or file and use it without the author' s permission. Since the development of UNIX, the UNIX community—since there is not the same sense of proprietary ownership as there is in the commercial computer industry because it is based on an open source idea—uses the term to mean the acquisition of a file or set of files across a network. It is a command line resource grabber, transferring files through the HTTP, gopher, finger and FTP protocols without user interaction.

  窃用

  最初,在编程语言领域,窃用是指未经作者的允许获取一个大文档或文件并加以使用。自从开发 Unix以来,Unix社团就利用本术语表示从网络上获取一个或一组文件。这是由于(在Unix界)没有商业计算机行业中那种专属拥有权,因为Unix是基于开放源码的。它是一种命令行资源抓取程序,无需用户的交互就能通过HTTP、gopher、finger和FTP协议传送文件。

  Bluesnarfing

  Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information — such as the user's calendar, contact list and e-mail and text messages —without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent.

  蓝牙窃用

  蓝牙窃用是指通过蓝牙连接偷窃无线设备上的信息。攻击者利用移动电话实现蓝牙的方法中存在的弱点访问信息,如用户的日程安排、联络表、电子邮件和短信,同时不留任何攻击的痕迹。其他采
用蓝牙的设备,如便携电脑,也可能受攻击,虽然受害程度弱一些。

原文转自:http://www.ltesting.net