DNS
Definition: The Domain Name System (DNS) was created to provide a way to translate domain names to their corresponding IP addresses. It is easier for users to remember the domain name, such as yahoo.com, than to try and remember the […]
Definition: The Domain Name System (DNS) was created to provide a way to translate domain names to their corresponding IP addresses. It is easier for users to remember the domain name, such as yahoo.com, than to try and remember the […]
Definition: Dynamic Host Configuration Protocol (DHCP) is used to automate the assignment of IP addresses to Hosts on a network. Each machine on the network must have a unique address. Rather than manually having to enter the IP address, track
Definition: A denial of service (DoS) attack floods a network with an overwhelming amount of traffic, slowing its response time for legitimate traffic or grinding it to a halt completely. The more common attacks use built-in features of the TCP/IP
Definition: A neutral zone or buffer that separates the internal and external networks. The DMZ (demilitarized zone) usually exists between two firewalls. External users can access servers in the DMZ, but not the computers on the internal network. The servers
Definition: The term cyberterrorism is used to describe officially sanctioned hacking as a political or military tool. Some hackers have used stolen information, or the threat of stealing information, as a tool to attempt to extort money from companies.
Definition: Cross site scripting (XSS) refers to the ability to use some of the functionality of active scripting against the user by inserting malicious code into the HTML that will run code on the user’s computer, redirect them to a
Cross-Site Scripting Read More »
Definition: Hacker purists often insist that “hackers” are simply curious computer experts with benign intent. Cracker is the term more often applied to a malicious or criminal hacker that attacks computer systems with mischiveous or malicious intent. Also Known As:
Definition: When used to discuss Internet security, it does not mean that two parties come to a mutually beneficial agreement. Rather, it means that the security of your computer or network is weakened. A typical security compromise can be a
Definition: A circuit-level gateway is a type of firewall. All internal computers establish a “circuit” with the proxy server. The proxy server performs all communications with the Internet. External computers only see the IP address of the proxy server and
Circuit-Level Gateway Read More »