Security FAQ

Comprehensive answers to your security questions and problems.

What is IP Spoofing?

IP spoofing, or Internet protocol address spoofing, is the method of creating an Internet protocol packet or IP packet using a fake IP address that impersonates a legal and legitimate IP address. A spoofed IP is a fake IP address that does not belong to any computer in the network. IP spoofing exploits the stateless […]

What is IP Spoofing? Read More »

What is Spoofed Packet?

A spoofed packet is an Internet Protocol packet created from a spoofed or fake IP address but is impersonating to be a legitimate and authentic sender. The spoofed packet is normally a request generated by a client node for the server or another computer. The basic purpose of using spoofed packets is to hide the

What is Spoofed Packet? Read More »

What is WPA?

WPA stands for Wifi Protected Access. WPA is an IEEE standard responsible for implementing wireless network security. WPA is a wireless security certification program developed by the WiFi alliance to increase the security of wireless networks and computers. Some of the main features of WPA are TKIP and MIC. TKIP stands for Temporal Key Integrity

What is WPA? Read More »

What is Port Scanner?

A Port Scanner is a tool or a software application that scans a network or an individual host for open ports. Port scanners have good use and bad use depending upon the individual who is using them. In the hands of an administrator, port scanners help identify and verify security issues through open ports. In

What is Port Scanner? Read More »

What is DNSSEC?

DNSSEC which stands for DNS Security Extension is basically a suite of specifications designed by the IETF (Internet Engineering Task Force) for the security of the DNS (Domain Name System) information provided using the IP (Internet Protocol) networks. DNSSEC provides the DNS clients with the assurance that the DNS data in response to their DNS

What is DNSSEC? Read More »

What is BitTorrent?

BitTorrent is a P2P (peer-to-peer) technology that is used for file sharing across the globe. BitTorrent is one of the most popular and common protocols that is used for file sharing on the Internet and it is assumed that as of 2009, almost 50% of the traffic on the net was Bittorrent traffic. BitTorrent allows

What is BitTorrent? Read More »

What is Static IP Address?

Computer systems that need to connect to the internet are assigned a unique identification number known as the IP address or the Internet Protocol Address. Each system on the internet will have a unique IP making it possible to connect and communicate with other systems from any part of the world. There are two types

What is Static IP Address? Read More »

What is Mac Address?

The MAC (Media Access Control) address is a unique address assigned to the network interface cards installed on computer systems. IP addresses are used for communication globally, but MAC addresses are used for communication within a physically local network segment. MAC addresses are embedded into the ROM (read-only memory) of the network card by the

What is Mac Address? Read More »

What is Packet Sniffer?

A packet sniffer is software capable of intercepting or eavesdropping on a system’s traffic, on a particular segment of a network, or the whole network, depending upon its placement. Packet sniffers collect data that can be captured and saved for later analyses or data-mining activities. Communication between systems occurs in the form of small segments

What is Packet Sniffer? Read More »

What is DNS Spoofing?

DNS spoofing is another man-in-the-middle attack that can force victims to navigate to a fake website purporting to be a real one. DNS spoofing is based on presenting fake DNS information to a victim in response to their DNS request and, as a result, forcing them to visit a site that is not the real

What is DNS Spoofing? Read More »