A firewall method in which each packet that attempts to pass through the firewall is examined to determine its contents. The packet is then allowed to pass or it is blocked, as appropriate.
A device or an application that allows data to be copied from the network and analyzed. In legitimate applications, it is a useful network troubleshooting tool.
A hub that has no power and therefore does not regenerate the signals it receives. Compare with active hub.
A SCSI bus terminator that uses a terminating resistor pack that is placed at the end of the bus. This resistor relies on the interface card to provide it with a consistent level of power.
A set of characters that is used ...