install copies files while setting their permission modes and, if possible, their owner
and group.
IANA Internet Assigned Names (Numbers?) Authority; part of Internet governance
icon A little graphic used in conjunction with a GUI. A well-designed icon is
supposed to be an obvious, unmistakable symbol of whatever it stands for and
occupy much less space than do the equivalent words
ICQ a program which allows Internet users to exchange messages in near-real-time
with other users in a fairly unsecure manner
IESG Internet Engineering Steering Group
IMAP Internet Message Access Protocol: It is a method of accessing electronic mail or
bulletin board messages that are kept on a (possibly shared) mail server.
inetd Berkeley daemon program that listens for connection requests or messages for
certain ports and starts server programs to perform the services associated with
those ports
Init The first process to run after the system boots and always has a process id of
1. It is responsible for starting the system in single user mode or spawning a
shell to read the startup files. It opens ports that are designated as login
ports and spawns getty processes for each on
inode A data structure holding information about files in a Unix file system. There is
an inode for each file and a file is uniquely identified by the file system on
which it resides and its inode number on that system. Each inode contains the
following information: the device where the inode resides, locking information,
mode and type of file, the number of links to the file, the owner's user and
group ids, the number of bytes in the file, access and modification times, the
time the inode itself was last modified and the addresses of the file's blocks
on disk
inode number a unique number associated with each filename. This number is used to look up an
entry in the inode table which gives information on the type, size, and location
of the file and the userid of the owner of the file
input Data entered into a computer system to be processed by a program
insert mode In vi, the mode that allows you to type new text in front of existing text in a
file; terminate this mode by pressing ESC
install To connect a piece of hardware to a computer system; to place the program files
of a piece of software in a directory, where they can be executed
interactive processing Performance of tasks on a computer system that involves continual exchange of
information between the computer and a user; the opposite of batch processing
Interpreted language An interpreted language depends on an interpreter program that reads the source
code and translates it on the fly into computations and system calls. The source
has to be re-interpreted (and the interpreter present) each time the code is
executed. Interpreted languages tend to be slower than compiled languages, and
often have limited access to the underlying operating system and hardware. On
the other hand, they tend to be easier to program. See Compiled language and
P-code language
Interrupts Interrupts are signals sent by devices which are received by the operating
system and then processed. A device driver is responsible for handling the
information that is received.
Intranet descriptive term being used for the implementation of Internet technologies
within a corporate organisation, rather than for external connection to the
global Internet
Intrusion detection The ability to detect people trying to compromise your system. Intrusion
detection is divided into two main categories, host based, and network based.
IP aliasing provides the possibility of setting multiple network addresses on the same
low-level network device driver (e.g two IP addresses in one Ethernet card)
IP Filtering Firewalls works at the packet level. It is designed to control the flow of packets based
the source, destination, port and packet type information contained in each
packet
IP Masquerade A networking function in Linux similar to one-to-many NAT (Network Address
Translation) found in many commercial firewalls and network routers. IP
Masquerade allows other "internal" computers connected to this Linux box (via
PPP, Ethernet, etc.) to also reach the Internet as well. Linux IP Masquerading
allows for this functionality even though these internal machines don't have an
officially assigned IP addresses
IP spoofing IP Spoofing is a complex technical attack that is made up of several components.
It is a security exploit that works by tricking computers in a
trust-relationship that you are someone that you really aren't. There is an
extensive paper written by daemon9, route, and infinity in the Volume Seven,
Issue fourty-Eight issue of Phrack Magazine.
IP-Accounting keeps track of IP network traffic, packet logging and produces some statistics
IP-Masquerading a developing networking function in Linux. If a Linux host is connected to the
Internet with IP Masquerade enabled, then computers connecting to it (either on
the same LAN or connected with modems) can reach the Internet as well, even
though they have no official assigned IP addresses
ipchains inserts and deletes rules from the kernel's packet filtering section
IPng IP Next Generation: a new version of IP which is designed to be an evolutionary
step from IPv4. It is a natural increment to IPv4. IPng is a new version of IP
which is designed to be an evolutionary step from IPv4. It is a natural
increment to IPv4. It can be installed as a normal software upgrade in internet
devices and is interoperable with the current IPv4. Its deployment strategy was
designed to not have any "flag" days. IPng is designed to run well on high
performance networks (e.g., ATM) and at the same time is still efficient for low
bandwidth networks (e.g., wireless). In addition, it provides a platform for new
internet functionality that will be required in the near future.
IPP Internet Printing Protocol. A new HTTP-like protocol for sending files to a
network printer
IPX/SPX Internet Packet Exchange/Sequenced Packet Exchange - a proprietary protocol
stack developed by Novell and based on Xerox Network Systems (XNS) protocol
IrNET A protocol allowing to carry TCP/IP traffic between two IrDA peers in an
efficient fashion. It is a thin layer, passing PPP packets to IrTTP and vice
versa. It uses PPP in synchronous mode, because IrTTP offer a reliable sequenced
packet service (as opposed to a byte stream). In fact, you could see IrNET as
carrying TCP/IP in a IrDA socket, using PPP to provide the glue.
Key:Commands -
People -
General
Last Updated Saturday, December 04 2004 @ 10:58 AM EST