Hijacking performs the act of hijacking packages on the desired route, an attacker thus taking control of one of the...
This type of attack is aimed at obtaining personal information (such as usernames, passwords, credit card details) by impersonating an...
DoS (Denial of Service) or DDoS (Distributed Denial of Service) attacks are a way to make computational resources unavailable to...
A sniffer is a computer program used to monitor and analyze network traffic from one network location to another. A...
SSL (Secure Sockets Layer) is an acronym that is a Netscape web protocol designed to transmit securely private documents over...
A recent technique of fighting network attackers consists of stretching three types of strategies: 1. Baits: creating a unique user...
Root-kits are malicious programs that give Internet attackers unlimited access to a system while hiding their presence at the same...
The RED algorithm is also known as Random Early Discard or Random Early Drop. This algorithm works at the router...
Congestion of the network is a phenomenon which consists of deterioration of the quality of services caused by the overloading...
1. Primary access rights in Linux 2. Capabilities in Linux 3. Testing capabilities in Linux 1. Primary access rights in...
The File Transfer Protocol or FTP is a protocol used to access files on servers from private computer networks or...
MD5 (Message Digest Algorithm 5) is a unidirectional hash-like cryptographic function that delivers a fixed 128-bit length value. The value...