A high-speed digital bandwidth connection from a phone wall jack on an existing telephone network. With this, data and voice are both sent on the same copper wire with data using one frequency and voice using another.
Digital Subscriber Line (DSL)
A set of protocols that provides security for Internet Protocol (IP) that can be used to set up a VPN solution.
Internet Protocol Security (IPsec)
A term meaning that a network or a service is up and accessible most of the time.
High availability
This Teenage Mutant Ninja Turtles villain wears metal armor covered in blades.
The Shredder
A digital mobile network that can provide internet access, commonly used by phones, tablets, laptops, and mobile hotspots.
Cellular networking
A protocol to secure IP protocols, such as HTTP and FTP, now largely unused.
Secure Sockets Layer (SSL)
A method for providing fault tolerance by using duplicate or multiple components that perform the same function.
Redundancy
This enemy of the transformers is very cruel to his minions and wants to conquer earth.
Megatron
Internet access provided by companies that offer cable TV service using the same lines.
Cable
A protocol that evolved from SSL and provides privacy and data integrity between two communicating applications.
Transport Layer Security (TLS)
The percentage of time the network or service is up and accessible.
Uptime
This enemy of He-Man seeks to steal the power of Greyskull through trickery and evil magic.
Skeletor
Provides internet access by using signals transmitted to and received from orbiting satellites.
Satellite
A standard for system logging. Using this, any device can send messages about the status of events that are occurring on the device, operating system, or applications. Operates using UDP on ports 514 and 601.
System Logging Protocol (Syslog)
The ability to respond to an unexpected hardware or software failure without loss of data or loss of operation.
Fault tolerance
This villain is the foe of Inspector Gadget and has a white cat and a menacing robotic claw hand.
Dr. Claw
A type of network that uses encryption to allow IP traffic to travel securely over the TCP/IP network. Used primarily to support secure communications over an untrusted network.
Virtual private network (VPN)
Communication method that encrypts packet contents and encapsulates them for routing though a public network.
Tunneling
Displays the graphical user interface of a remote device. Are used to remotely manage a computer or allow support personnel to view and troubleshoot a remote user's system.
Remote desktop
This villain is secretly the uncle of heiress Penelope Pitstop and wants to get rid of her to inherit her fortune.
The Hooded Claw