Page tree



  • A phreaking magazine published by the Yippies.
  • Test Anything Protocol: A protocol for communication between units being tested and a test harness.
  • Slang term for a method of eavesdropping/signal interception. So-called due to the original phone taps needing to be attached to the physical wire ("tapped into") to perform the spying. On a party line system the same basic principle could occur, though the speakers could (often times) tell they were being listened to. With time it became less obvious that eavesdropping was taking place. As an example party line system opens both transmission and receiving lines in a phone circuit, with a microphone attached to the receiving end, a tap could (for instance) be placed that opened both lines but did not include a microphone.

Target: The IP Address or Domain interacting with the network device.


A third protocol (UDP) is also widely used for communications over networks, however it sits on top of the OSI network model and is not baked in.

TCP/IP (To Connect Protocol / Internet Protocol): These two protocols form the backbone of the Internet. This is further explained in their individual sections.

TCP (To Connect Protocol): An ordered, error-checked delivery protocol for hosts communicating over an IP based network.

"It's the user-friendly part of an IP address." -Nicko

TDSS : Alternative name to the Alureon trojan.

Telnet : Allows for text based interaction with a terminal, or virtual terminal in modern systems.

Time To Live (TTL or hop limit): The number of hops (points in the network) a packet may take before it is considered invalid. Once this has expired the packet is discarded to keep data from circulating indefinitely. Note that by counting the number of hops a packet has taken, and comparing distances to reported hops it's possible to determine a rough physical vicinity for a given device.

TKEY (Transaction Keys): A record type kept by the Domain Name System. These can be used to establish keys between servers and resolvers.

TKIP (Temporal Key Integrity Protocol): A stopgap security protocol used in the IEEE 802.11 wireless networking standard. It was developed as an interim solution to replace WEP.


  • Three Letter Acronym: Reference to the use of Three-Letter Acronyms to refer to just about everything. This is the main reason this glossary was started.
  • Three Letter Agency (also: MLA (Multi-Letter Acronym)): Any of a bevvy of government agencies identified by their initials, for example: Federal Bureau of Investigation (FBI), Central Intelligence Agency (CIA), National Security Agency (NSA), Defense Intelligence Agency (DIA). These can quickly devolve into longer initialisms and acronyms (GCHQ, NASA), and when used in conjunction can lead to Alphabet Soup. See: Alphabet Soup

Some valid TLD examples:

.comCommercial Interests
.eduEducational Interests
.govGovernment Entities
.orgNon-profit Organizations
.ukServers located in the United Kingdom

A full list of TLDs can be found here.

TLD (Top-Level Domain): The right-most entry of a url, typically used to categorize the type of service being provided. For example:

TLS (Transport Layer Security): The replacement for SSL, it is a cryptographic protocol designed to provide secure communications over a computer network.

TOR (The Onion Router): An anonymization service based on research created by the US Navy to help obfuscate traffic being generated by end-users under oppressive governments. It also is used by less upstanding citizens to conduct questionable business.

Torpig : A.k.a. Sinowal or Anserin, spread with Mebroot. A type of botnet that looks to collect sensitive data. Targeted at Microsoft Windows.

Trojan : As in horse, this is a type of malware that carries a payload intended to pilfer personal data and report to a C&C, or to create out of tolerance behavior for a system with the intention of causing disruption of service and/or damage.

TSIG (Transaction Signature): A computer networking protocol defined in RFC 2845. Part of DNSSEC. Used primarily by the Domain Name System (DNS) to provide a means of authenticating updates to a DNS database.

Two-factor authentication (2fa): A login schema using two different forms of identification to login to a device. For example, an account password, plus a randomly generated number from a device that has been synchronized with the login server.