Home » Archive

Articles tagged with: Protocol

It news »

[4 Jan 2010 | No Comment | 1,029 supporters]
How to Check the High Availability of a Server

Whenever we deal with a physical system constructed by man the term of availability is mandatory. The availability of a system represents the time for which the users have access to that system. The term is mostly used when speaking about servers or other type of hosts. If a user wants to access the server, but the server cannot respond to the request it is said that the server is down. The availability of the server is the total time for which that server is not down. The two notions …

It news »

[31 Aug 2008 | No Comment | 890 supporters]

Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like the National Security Agency.
The tactic exploits the internet routing protocol BGP (Border Gateway Protocol) to let an attacker surreptitiously monitor unencrypted internet traffic anywhere in the world, and even modify it before it reaches its destination.
The demonstration is only the latest attack to highlight fundamental security weaknesses in some of the internet’s core protocols. Those protocols were largely developed in the 1970s …

Uncategorized »

[17 Jul 2008 | 2 Comments | 1,937 supporters]

Multiple DNS implementations vulnerable to cache poisoning

Overview
Deficiencies in the DNS protocol and common DNS implementations facilitate DNS cache poisoning attacks.
I. Description
The Domain Name System (DNS) is responsible for translating host names to IP addresses (and vice versa) and is critical for the normal operation of internet-connected systems. DNS cache poisoning (sometimes referred to as cache pollution) is an attack technique that allows an attacker to introduce forged DNS information into the cache of a caching nameserver. DNS cache poisoning is not a new concept; in fact, there are published …