Amazon / Building Dependable Distributed Systems / Panix / NEEDHAM / Yahoo / Microsoft / /
Country
United States / United Kingdom / /
IndustryTerm
the Web / Internet Control Message Protocol / back-end business systems / email / Internet worm / network-connected devices / local networking / configuration management / Internet Protocols / intrusion detection systems / uses available tools / online subscriber / Internet services / Internet relay chat / exploit software / file server / file systems / Internet host addresses / higher-level services / Internet connection / high-profile Web sites / target network / target site / Web servers / packet sniffer software / network services / short-term solution / stateless protocol / Internet protocol suite / few military systems / Internet security / virtual private network / fixed and new software releases / Internet Protocol / boundary control devices / Web server software / attack software / sold solution / Internet Information Server / penetration tools / vulnerable Web servers / secure network / software monoculture / internal network / /
OperatingSystem
Unix / Linux / Macintosh / Windows NT / Windows 95 / Solaris operating system / /
Organization
FDA / /
Person
Bob / Alice / / /
Position
U.K. prime minister / and were initially blamed on hackers / system administrator / private detective / working security engineer / administrator / AND BUTLER / /
Product
Information Server / /
Technology
SNMP / LAN / IPv6 / SNMP protocol / subnet mask / POP protocols / Unix / Linux / IP / VPN / disk drive / stateless protocol / Internet protocols / plug and play / operating system / operating systems / Network File System / TCP/IP / CGI / encryption / Ethernet / cryptography / DNS / firewall / lower-level TCP/IP protocols / network address translation / 2.2 Attacks Using Internet Protocols / file sharing / HTTP / ISP / Web server / network protocols / be solved using cryptography / /