Glossary
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z 

TCP or Transmission Control Protocol
The protocol in the suite of protocols known as TCP/IP that is responsible for breaking down messages into packets for transmission over a TCP/IP network such as the Internet. Upon arrival at the recipient computer, TCP is responsible for recombining the packets in the same order in which they were originally sent and for ensuring that no data from the message has been misplaced in the process of transmission.

TCP/IP or Transmission Control Protocol/ Internet Protocol
The suite of protocols that allows different computer platforms (such as Mac or PC) utilizing different operating systems (such as Windows, MacOS or Unix) or different software applications to be able to communicate. Although TCP and IP are two distinct protocols, each of which serves a specific communicational purpose, the term TCP/IP is used to refer to a set of protocols that include many different protocols. Other protocols in TCP/IP include, but are not limited to:

  • HTTP - Hypertext Transfer Protocol
  • FTP - File Transfer Protocol
  • SMTP - Simple Mail Transfer Protocol
  • POP - Post Office Protocol

Each of these protocols, along with many others, allows computers on the Internet to exchange different types of information using different applications.

Telnet
The main Internet protocol for creating an interactive control connection with a remote machine. Telnet is the most common way of allowing users a remote connection to a network, as with telecommuters or remote workers.

Trapdoor
A secret entry point into a computer program that illegitimate users may use to get around authentication and validation methods intended to prevent unauthorized entry.

Trojan Horse
A program that appears to serve one purpose, but it reality performs an unrelated (and often malicious) task. Named after the famous Trojan Horse of Greek mythology in which Greek soldiers snuck into the city of Troy in the belly of a wooden horse that was made to appear to be a gift for the Trojans.



 

Privacy Statement
Copyright 2010, SecurityFocus