2
Comcast, AT&T, Knology, etc.
3
Multiplexing scheme using modulation
4
Dork.loser.com's relationship to dork.com
6
$4k crimeware program Roman uses for research
10
Hexidecimal code unique to each device
11
OSI level most familiar to users
13
Dork.com's relationship to dork.loser.com
15
A port with an ipaddress
16
March 2010 massive spyware program
18
Program flaws unknown to the public (three words)
20
A Microsoft P2P VoIP service screwing up your firewall settings
22
Defines the relationship between computers in forests and domains
23
Multiplexing scheme where reassembly is necessary
28
OSI layer responsible for plug shapes
29
A partially-centralized P2P network for file sharing (two words)
31
Most wasteful transmission method
33
Internet backbone service providers
34
Fiber-optic and copper wire internet connection
38
Program or device that filters internet traffic
39
Combining data to use a single transmission pathway
41
A peer-to-peer network with no central servers
42
.com, .gov, .net, .edu, etc. (three words)
44
A deployed server for support and network protection
45
Stuxnet attacked these "computers"