Search Details

Word: datajacks (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Currently, users must each register a specific datajack at the beginning of the term. In addition, they must supply computer identification, Ethernet type and other individual information. Students must register each they time they use a new datajack...

Author: By James P. Mcfadden, CRIMSON STAFF WRITER | Title: Revolution in the Works | 2/10/1999 | See Source »

Beginning soon, though, datajack registration will become obsolete. Users will each receive an IP address, and in addition to their primary dorm room connection port, they will be able to plug into the network from any campus connection port...

Author: By James P. Mcfadden, CRIMSON STAFF WRITER | Title: Revolution in the Works | 2/10/1999 | See Source »

According to Osterberg, the University isconsidering several "long-term" plans to bolsternetwork security. The first is "switchednetworking," a system in which every datajack iscompletely isolated from every other datajack.While this prohibits packet sniffing, it is a verycostly procedure which would require extensiverewiring of hundreds of datajacks...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

...termination points for a subnet are the ethernet datajacks in student rooms. Within the subnet, the traffic on the network actually travels to all points, so that when you enter your password, the information is broadcast across the subnet to every datajack...

Author: NO WRITER ATTRIBUTED | Title: BARATUNDE R. THURSTON'S TechTalk | 9/29/1998 | See Source »

...each of these packets leaves your computer through the Ethernet card, it travels via the datajack through wiring behind your walls. The wiring here is mostly copper, fairly similar to the cabling used for telephone service...

Author: NO WRITER ATTRIBUTED | Title: techTalk | 12/2/1996 | See Source »

| 1 | 2 | Next