TCP/IP

What is IP Masking?

IP masking is the process of hiding your actual IP address. The most frequently used IP masking method involves using a proxy server that acts as a middleman between the computer and the server. The computer sends its request to the proxy server, and the proxy server transmits a fake IP address to the original […]

What is IP Masking? Read More »

What is DNS?

DNS stands for Domain name service. It’s a standard set of protocols that comprise TCP\IP. To implement DNS, two software components are required. The DNS server and the client DNS work as a requesting node.  The client-side and the server-side, both components work as a background service. DNS is the standard naming system for all

What is DNS? Read More »

What is VPN?

VPN or in other words Virtual Private Network is a technology that allows computer users or companies to create a secure connection over the public network, for example, the Internet, and connect to their destination. VPN allows two private networks to communicate securely over the Internet through the establishment of a virtual network. In other

What is VPN? Read More »

What is DNS Hijacking?

DNS (Domain Name System) hijacking is also known as DNS redirection or DNS spoofing. DNS hijacking is the process of redirecting the requesting IP address to servers other than the originally requested DNS server. DNS hijacking is used for malicious purposes, primarily for phishing. Technically speaking, DNS hijacking does not fall in the category of

What is DNS Hijacking? Read More »

What is IP Spoofing?

IP spoofing, or Internet protocol address spoofing, is the method of creating an Internet protocol packet or IP packet using a fake IP address that impersonates a legal and legitimate IP address. A spoofed IP is a fake IP address that does not belong to any computer in the network. IP spoofing exploits the stateless

What is IP Spoofing? Read More »

What is Port Scanner?

A Port Scanner is a tool or a software application that scans a network or an individual host for open ports. Port scanners have good use and bad use depending upon the individual who is using them. In the hands of an administrator, port scanners help identify and verify security issues through open ports. In

What is Port Scanner? Read More »

What is DNSSEC?

DNSSEC which stands for DNS Security Extension is basically a suite of specifications designed by the IETF (Internet Engineering Task Force) for the security of the DNS (Domain Name System) information provided using the IP (Internet Protocol) networks. DNSSEC provides the DNS clients with the assurance that the DNS data in response to their DNS

What is DNSSEC? Read More »

What is Static IP Address?

Computer systems that need to connect to the internet are assigned a unique identification number known as the IP address or the Internet Protocol Address. Each system on the internet will have a unique IP making it possible to connect and communicate with other systems from any part of the world. There are two types

What is Static IP Address? Read More »

What is Mac Address?

The MAC (Media Access Control) address is a unique address assigned to the network interface cards installed on computer systems. IP addresses are used for communication globally, but MAC addresses are used for communication within a physically local network segment. MAC addresses are embedded into the ROM (read-only memory) of the network card by the

What is Mac Address? Read More »

What is DNS Spoofing?

DNS spoofing is another man-in-the-middle attack that can force victims to navigate to a fake website purporting to be a real one. DNS spoofing is based on presenting fake DNS information to a victim in response to their DNS request and, as a result, forcing them to visit a site that is not the real

What is DNS Spoofing? Read More »