What is DNS Hijacking?

DNS (Domain Name System) hijacking is also known as DNS redirection or DNS spoofing. DNS hijacking is the process of redirecting the requesting IP address to servers other than the originally requested DNS server. DNS hijacking is used for malicious purposes, primarily for phishing. Technically speaking, DNS hijacking does not fall in the category of […]

What is DNS Hijacking? Read More »

What is SSH?

SSH stands for Secure Shell. Secure Shell is a network security protocol that provides a secure and reliable channel for two networked connected computers for transmitting data and confidential information. SSH was originally built to replace insecure remote shells like Telnet. These insecure shells sent information like passwords and usernames in plain text format that

What is SSH? Read More »

What is IP Spoofing?

IP spoofing, or Internet protocol address spoofing, is the method of creating an Internet protocol packet or IP packet using a fake IP address that impersonates a legal and legitimate IP address. A spoofed IP is a fake IP address that does not belong to any computer in the network. IP spoofing exploits the stateless

What is IP Spoofing? Read More »

What is Spoofed Packet?

A spoofed packet is an Internet Protocol packet created from a spoofed or fake IP address but is impersonating to be a legitimate and authentic sender. The spoofed packet is normally a request generated by a client node for the server or another computer. The basic purpose of using spoofed packets is to hide the

What is Spoofed Packet? Read More »

What is WPA?

WPA stands for Wifi Protected Access. WPA is an IEEE standard responsible for implementing wireless network security. WPA is a wireless security certification program developed by the WiFi alliance to increase the security of wireless networks and computers. Some of the main features of WPA are TKIP and MIC. TKIP stands for Temporal Key Integrity

What is WPA? Read More »

How to secure WiFi?

You can secure your WiFi networks both LAN and WAN by following these instructions • The first thing you must do after setting up your wireless network is to change the administrator interface login and password of your WiFi router or access point. Most of the WiFi routers and access points come with a default

How to secure WiFi? Read More »

What is Port Scanner?

A Port Scanner is a tool or a software application that scans a network or an individual host for open ports. Port scanners have good use and bad use depending upon the individual who is using them. In the hands of an administrator, port scanners help identify and verify security issues through open ports. In

What is Port Scanner? Read More »

How to secure Local Network?

A local network means a collection of two or more computers that are connected together via some medium it can be air (wireless) or cable. Network security is a branch of networking that encompasses strategies, policies, and standard operating procedures that make the network secure from various threats like unauthorized access or misuse. These policies

How to secure Local Network? Read More »

What is DNSSEC?

DNSSEC which stands for DNS Security Extension is basically a suite of specifications designed by the IETF (Internet Engineering Task Force) for the security of the DNS (Domain Name System) information provided using the IP (Internet Protocol) networks. DNSSEC provides the DNS clients with the assurance that the DNS data in response to their DNS

What is DNSSEC? Read More »

What is BitTorrent?

BitTorrent is a P2P (peer-to-peer) technology that is used for file sharing across the globe. BitTorrent is one of the most popular and common protocols that is used for file sharing on the Internet and it is assumed that as of 2009, almost 50% of the traffic on the net was Bittorrent traffic. BitTorrent allows

What is BitTorrent? Read More »