A man in middle attack, generally occurs when attackers are able to place themselves in the middle of two other hosts that are communicating in order to view and/or modify the traffic.It is also called as Bucket-Bridge Attack. This will do by making sure that all communications...
Sunday, 3 January 2016
Monday, 28 December 2015
What is Sniffing attack?
A Sniffer is an application that can capture networks packets. Sniffers are also Known as network protocol analyzers. Objective of sniffing is to steal: 1. Password (From Email, Website, FTP, TELNET etc) 2. Email Text 3. Files in transfer A network sniffer is software or...
Wednesday, 23 December 2015
What is DOS(Denial of service) attack?
Denial of service(DOS) attack is a type of attack which can exploit a known vulnerability in a specific application or operating system, or may attack features or weaknesses in particular protocols or services. By this attack, the attacker is attempting to...
Monday, 21 December 2015
What is computer security?
Computer security is protection given to an automated imformation system in order to obtain the applicable objectives of preserving the integrity, availability and confidentiality of information system resource like hardware, software, firmware, data and telecommunication. Computer security is nothing but to provide security to data, computer systems, services...