Search Details

Word: subnet (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...termination points for a subnet are the ethernet datajacks in student rooms. Within the subnet, the traffic on the network actually travels to all points, so that when you enter your password, the information is broadcast across the subnet to every datajack...

Author: NO WRITER ATTRIBUTED | Title: BARATUNDE R. THURSTON'S TechTalk | 9/29/1998 | See Source »

What prevents others from simply grabbing your information is that most of the time, your computer only views what is intended for it. However, there are tools that allow access to all network traffic on a subnet. Such a technique is referred to as IP-sniffing, and if put to malicious use someone can, for example, collect all the login information flying across the subnet...

Author: NO WRITER ATTRIBUTED | Title: BARATUNDE R. THURSTON'S TechTalk | 9/29/1998 | See Source »

HASCS will split its machines from one subnet to two over the weekend "to help speed the flow of information between the many server machines we use," Steen said...

Author: By Douglas M. Pravda, | Title: UNIX Will Be Down Saturday | 3/17/1995 | See Source »

...post on harvard.general yesterdayafternoon, Unix Systems Programmer Tom Heftindicated that the fas, husc7, scunix1 and scunix5machines will be split off onto one subnet, whileeverything else will be placed on another subnet...

Author: By Douglas M. Pravda, | Title: UNIX Will Be Down Saturday | 3/17/1995 | See Source »

| 1 | 2 | Next