Roll Your Own Network
About
Network Design
Desktop
Router
Server
Network Attached Storage
Smartphone
Certificate Authority
Glossary
Bibliography
To Do
Roll Your Own Network
Index
Index
Symbols
|
A
|
B
|
C
|
D
|
E
|
F
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Z
Symbols
3DES
802.11
802.11a
802.11ac
802.11ax
802.11b
802.11e
802.11g
802.11n
802.11w
802.3ad
A
ACME
Advanced Encryption Standard
Advanced Encryption Standard Instruction Set
AES
AES-NI
AMD Platform Security Processor
AMD PSP
AMD Secure Technology
AMT
ARC
AUTH
Authenticated Received Chain
Automated Certificate Management Environment
AXFR
B
Basic Service Set Identifier
Bayesian Filter
Bayesian Filtering
Bayesian Spam Filter
Beacon Broadcast interval
Beacon Interval
BLAKE2b-256
Blowfish
BSSID
C
CA
CCM mode Protocol
CCMP
Certificate Authority
Chip card
Cipher Suite
Selection of
Set in Dovecot
Set in Postfix
Set in Prosody
COM Port
Composer
Counter Mode CBC-MAC Protocol
Counter Mode Cipher Block Chaining Message Authentication Code Protocol
Cryptographic Hash Function
Cryptographic Token Information Format Standard
Cryptographic Token Interface
Curve25519
D
Daemon
DANE
Data deduplication
Data Encryption Standard
Delegation-Signing
Delivery traffic indication map
Delivery traffic indication message
DES
DH
DH Parameters
Diceware
Diffie-Hellman Key Exchange
Digital Fingerprint
Digital Signature Algorithm
Digital Signature Standard
DiskStation Manager
Distance Optimization
DKIM
DMARC
DNS
DNS Resolver
DNS zone transfer
DNS-based Authentication of Named Entities
DNS-over-HTTPS
DNS-over-TLS
DNSCrypt
DNSKEY
DNSSEC
DoH
Domain Name System
Domain Name System Security Extensions
Domain-based Message Authentication, Reporting and Conformance
DomainKeys Identified Mail
DoT
DSA
DSM
DSS
DTIM Interval
Dual EC DRBG
Dual Elliptic Curve Deterministic Random Bit Generator
E
ECC
ECDH
ECDSA
Ed25519
EdDSA
EEPROM
EFF
Electrically Erasable Programmable Read-Only Memory
Electronic Frontier Foundation
Elliptic Curve Cryptography
Elliptic Curve Diffie–Hellman
Elliptic Curve Digital Signature Algorithm
Elliptic-Curve Cryptography
Elliptic-Curve Diffie–Hellman
EPROM
Erasable Programmable Read-only Memory
ESMTP
F
File Transfer Protocol
Filter Bubble
FIPS
Firmware
Forward Secrecy
Fragmentation Threshold
FS
FTP
H
Hash
Hash Function
Hash Functions
HMAC
HPKP
HSTS
HTTP
HTTP Public Key Pinning
HTTP Strict Transport Security
HTTPS
Hypertext Transfer Protocol
Hypertext Transfer Protocol Secure
I
IANA
ICANN
ICC
IEEE
IEEE 802.11
IEEE 802.11ac
IEEE 802.11ax
IEEE 802.11b
IEEE 802.11e
IEEE 802.11g
IEEE 802.11i
IEEE 802.11i-2004
IEEE 802.11n
IETF
IMAP
,
[1]
Institute of Electrical and Electronics Engineers
Integrated Circuit Card
Intel Active Management Technology
Intel Management Engine
Internet Assigned Numbers Authority
Internet Corporation for Assigned Names and Numbers
Internet Engineering Task Force
Internet Protocols
IMAP
,
[1]
LMTP
,
[1]
POP
SMTP
,
[1]
,
[2]
Internet Relay Chat
IRC
J
Jabber
K
Keccak
Key Authentication
Key-signing-key
KSK
L
LACP
LDA
LDAP
LFU
Link Aggregation Control Protocol
LMTP
,
[1]
Local Delivery Agent
Long Preamble
LRU
LUA
M
MAC
MAC Address
Mail Access Server
Mail Delivery Agent
Mail Transfer Agent
Manageability Engine
Management Frame Protection
MAS
MD5
MDA
ME
Media Access Control
Media Access Control Address
Memcache
Memcached
Message Authentication Code
Message Submission Agent
Message User Agent
MFP
Milter
MIMO
MSA
MTA
MTA-STS
MU-MIMO
MUA
MX
N
National Institute of Standards and Technology
National Security Agency
Network Time Protocol
NIST
NIST P curves
NIST P-224
NIST P-256
NIST P-384
NIST-P-512
NNTP
NSA
NTP
Null Modem
O
OFDMA
OMEMO
OPDS
Open Publication Distribution System
OpenPGP
Opportunistic TLS
P
PDU
PEM
PEM Encoded
PEM File Format
Perfect Forward Secrecy
,
[1]
PFS
PKCS
PKCS #1
PKCS #11
PKCS #15
POP
POP3
Power Distribution Unit
PSP
Public-Key Cryptography Standards
Q
QAM
QoS
Quality of Service
R
Rainbow Table
RC4
Read-Only Memory
regex
regexp
Regular Expression
Request for Comments
RFC
RFC 1918
,
[1]
,
[2]
,
[3]
RFC 2033
RFC 2440
RFC 2560
RFC 2595
RFC 2830
RFC 3156
RFC 3207
RFC 4217
RFC 4398
,
[1]
RFC 4642
RFC 4849
RFC 4880
RFC 5011
RFC 5228
RFC 5280
RFC 5321
RFC 5737
RFC 6120
,
[1]
RFC 6186
RFC 6376
RFC 6409
RFC 6698
RFC 6764
RFC 6960
RFC 7208
RFC 7469
RFC 7489
RFC 7929
RFC 8017
RFC 821
RFC 8301
RFC 8461
,
[1]
RFC 8463
RFC 8555
RFC 8624
ROM
RS-232
RSA
RSA Cryptography Standard
RTS/CTS Threshold
S
Salt
Secure Sockets Layer
Sender Policy Framework
Serial Port
Service Set Identifier
SHA
SHA-1
SHA-2
SHA-224
SHA-256
SHA-3
SHA-384
SHA-512
SHA-512/224
SHA-512/256
SHA1
SHA2
Short Preamble
Sieve
Smart card
Smartcard
SMTP
SMTP MTA Strict Transport Security
SMTPS
spam
SPF
SSH
SSID
SSL
STARTTLS
Stock ROM
Submission
T
Temporal Key Integrity Protocol
TKIP
TL
DR
TLDR
TLS
TLSA
TOFU
Transport Layer Security
Twofish
U
UPS
ups
V
virus
Voice over IP
Voice over Wireless LAN
VoIP
VoWLAN
W
WebRTC
WEP
Wi-Fi
Wi-Fi Multimedia
Wi-Fi Protected Access
Wi-Fi Protected Access II
Wi-Fi Protected Setup
Wired Equivalent Privacy
Wireless LAN Channel
Wireless Local Area Network Channel
Wireless Multimedia Extensions
WLAN
WLAN Channel
WME
WMM
WPA
WPA2
WPA2-PSK
WPA3
WPS
X
X.509
XML
XMPP
Z
Zone-Signing-Keys
ZSK