Networking

[Networking][bleft]

System Tweaks

[System Tweaks][threecolumns]

Some Networking and Hacking Issues

Backdoors:
                  The backdoors also referred as the trapdoor, it’s basically a hole in the security of a computer system deliberately left a place in the computer system by designer or programmers. The Hackers may also leave back doors in a systems bcoz they can return at a later time.

Brute Force:
           Brute force is the technique or attack to share all powerful key combination by all keyboard and other strokes until the find solution. It is usually refer to cracking the password by trying all possible of key combination.
            You should always remember that your password having a Brute force, means the including all the possible key combination in your password like special characters, alphanumeric keys, spaces etc.

DoS Attacks:
                  The DoS denoted by the “Denial of Services”. In fact it’s an attack into the computer system for trying to access and shutdown the particular remote system in the network. The target can be usually high profile attack by the web sites or other links.

DDoS Attacks:
               The DoS denoted by the “Distributed Denial of Services”. This is also an attack where the much of the computer system are coordinated and attack on a single computer in the network at any time.
Virus:
             Virus is the harmful code of the program which is generally designed to temper the computer system. It is generally use to replicating itself and modifying other programs and can also executed by attached or interacting the other executable file or programs.

Worm:
            Worm is also a fragment code of program which is usually used to replicate itself and it’s an independent program and no need to execute by other programs. It is usually doesn’t modify other programs.
Trojan Horse:
                It’s a basically harmful code of program which is used to design for gathering or stealing useful information of the other computer on the network. It’s run via attach inside of other programs and send to the destination host and then it will attack and return information to the source computer system.

Session Hijacking:
                  Session hijacking is a process where attackers tack over or hijacks an exiting network connection between a client and server. This allows that attackers to execute commands on the servers.

Buffer Overflow:
                 It can happen when we try to more stuff data into the buffer (which is holding area) compare than its handling capacity. It is basically exploited by the crackers to executed the own command with the root (master) permission.
Post A Comment
  • Blogger Comment using Blogger
  • Facebook Comment using Facebook
  • Disqus Comment using Disqus

No comments :


Sponsored Here ...

Registry Tweaks

[Registry Tweaks][grids]

Social Tweaks

[Facebook][twocolumns]

Browsers

[Browsers][list]

Downloads

[Downloads][twocolumns]