Port Scan
Definition: A port scan is a method used by hackers to determine what ports are open or in use on a system or network. By using various tools a hacker can send data to TCP or UDP ports one at […]
Definition: A port scan is a method used by hackers to determine what ports are open or in use on a system or network. By using various tools a hacker can send data to TCP or UDP ports one at […]
Definition: Phishing is a type of attack aimed at obtaining a user’s personal or confidential information. It typically involves some sort of spam email designed to lure a user to a spoofed web site. Also Known As: Phishing Attack, Phishing
Definition: Pharming is similar to phishing in that it aims to collect personal and confidential user information which can be used for identity theft and other malicious purposes. Pharming relies on making unauthorized changes to DNS entries which result in
Definition: A patch is like a bandaid. As a company finds bugs and defects in their software they know that they need to fix them when they release the next version of the application. However, some bugs make the current
Definition: A packet, otherwise known as a datagram, is a fragment of data. Data transmissions are broken up into packets. Each packet contains a portion of the data being sent as well as header information which includes the destination address.
Definition: Packet sniffing is the act of capturing packets of data flowing across a computer network. The software or device used to do this is called a packet sniffer. Packet sniffing is to computer networks what wire tapping is to
Definition: A packet filter is a type of firewall. Packet filters can restrict network traffic and protect your network by rejecting packets from unauthorized hosts, using unauthorized ports or trying to connect to unauthorized IP addresses.
Definition: Peer-to-Peer Networking (P2P) is a phrase coined to apply to individual PC’s acting as servers to other individual PC’s. Made popular by the music file swapping service Napster, P2P allows users to share files with each other through a
Definition: Network security is used to describe all aspects of securing your computer or computers from unauthorized access. This includes blocking outsiders from getting into the network at all, as well as password protecting your computers and ensuring that only
Definition: Technically, it only takes two computers, or hosts, to form a network. A network is any two or more computers connected together to share data or resources. Common network resources are things like printers that may be shared by