|
|
hacker tools, 376
IP spoofing, 376, 377
Ping of Death, 377
SYN floods, 378
WinNuke, 377–378
HAL (Hardware Abstraction Layer), 228
half-duplex communications, 5
.HAM extension, 214
Hard Disk Not Found message, 437
Hardware Abstraction Layer (HAL), 228
hardware addresses, 525
in Data Link layer, 64–65
in IPX/SPX, 119
Hardware Compatibility List (HCL), 233
hardware diagnostics, 287–288
hardware loopbacks, 288, 491, 491, 525
hardware problems vs. software, 461–462
hardware requirements
for Novell NetWare, 211–212
for remote access, 318–320
for Windows NT, 233
HCL (Hardware Compatibility List), 233
HDSL (High Data-Rate Digital Subscriber Line), 325
header checksum field, 115
headers
IP, 114, 114
IPX/SPX, 120
TCP, 112–113, 112
heartbeats, 408, 525
Hellman, Martin, 388
heuristic scanning, 438
High Data-Rate Digital Subscriber Line (HDSL), 325
histories, password, 363–364
hop counts, 270, 525
hops, 80, 525
Host field, 149
Host-to-Host layer, 111, 526
hosts, 8, 525
in DNS configuration, 149
in TCP/IP, 87
for telnet, 193
HOSTS file, 138
hot-pluggable PCI cards, 211
hot sites, 407–411
hot swapping disk subsystems, 271
HTML (Hypertext Markup Language), 526
HTTP (Hypertext Transfer Protocol), 118, 526
HTTP proxies, 370–371
hubs, 35, 526
in installation, 268–269
MDI/MDX port setting on, 464
in Physical layer, 62–63, 62
in star topologies, 14, 58
switching, 75, 75
humidity, 264, 496
hybrid mesh topology networks, 16
Hypertext Markup Language (HTML), 526
Hypertext Transfer Protocol (HTTP), 118, 526
|
|