The GNU Compiler Collection is a set of compilers for various programming languages produced by the GNU Project. GCC has...
Cryptographic puzzles are a method of protecting against DoS attacks. The idea behind cryptographic puzzles is the following: for a...
Hijacking performs the act of hijacking packages on the desired route, an attacker thus taking control of one of the...
This type of attack is aimed at obtaining personal information (such as usernames, passwords, credit card details) by impersonating an...
DoS (Denial of Service) or DDoS (Distributed Denial of Service) attacks are a way to make computational resources unavailable to...
A sniffer is a computer program used to monitor and analyze network traffic from one network location to another. A...
SSL (Secure Sockets Layer) is an acronym that is a Netscape web protocol designed to transmit securely private documents over...
A recent technique of fighting network attackers consists of stretching three types of strategies: 1. Baits: creating a unique user...
Root-kits are malicious programs that give Internet attackers unlimited access to a system while hiding their presence at the same...
The RED algorithm is also known as Random Early Discard or Random Early Drop. This algorithm works at the router...
Congestion of the network is a phenomenon which consists of deterioration of the quality of services caused by the overloading...
1. Primary access rights in Linux 2. Capabilities in Linux 3. Testing capabilities in Linux 1. Primary access rights in...