How do you be secure on an unsecured network?
You con not be totally secure on any network, secured or unsecured. There is always someone out there that would "love to show us what we don't know about computers". Not my words, someone else's that I used to work with. However, you can be relatively secure. You can use SSL. You can use a secured VPN. You can ... It hard to quantify security. Is it 99%? Is it 99.997%? It comes down to safe practices - Updated OS - Current Antivirus - not doing unsafe things.
A start of authority (SOA) record is information stored in a domain name system (DNS) zone about that zone and about other DNS records. A DNS zone is the part of a domain for which an individual DNS server is responsible. Each zone contains a single SOA record. SOA records are defined in IETF RFC 1035, What_is_SOA_records- Implementation and Specification.
Read more: What_is_SOA_records
Anil Bankey
Is a simple set of instructions that enables a computer to initially recognize its hardware?
BIOS (Binary In Out System)
Email hackers are generally tracked by Cyber crime police. They can track the IP address of the hacker. With the IP address, they can track the location of person.
What are the Advantages and disadvantages of paper form vs computer generated form?
One wastes our air and other resources. The other polutes the air and uses coal.
Difference between supernetting and subnetting?
SUBNET: subnet is a group of networks having same network id. subnet increase the number of hosts with same network address, as result it reduces the wastage of addresses.
In subnetting bits of hostId will be captured by networdId.
SUPERNET:
supernet makes all the hosts with in a range of network address belong to a same group. This reduces the entries in the network address table.
Supernetting combines the octets of the address.
What is the default password for linksys router?
IP stands for Internet Protocol, and is the means of 2 computers sending information to one another. The IP address for a Linksys router is usually 192.168.11, and may be the IP address for other manufacturers as well.
-Function knob set to F
-Cipher switch set to LD
Is the computer a data terminal equipment?
A Data Terminal Equipment (DTE) is a communication device that is the source or destination of signals on a network, typically a terminal or a computer. It communicaties with the data circuit-terminating equipment and can perform all the required functions necessary to permit users to communicate.
What kind of software offers data security for a network?
There are two main types of software that offer data security for the network of home users, including Personal Firewalls & Encryption. Personal Firewalls protect you from network intrusions like viruses, and Encrytion protects your sensitive data while you're online.
List two advantages of the SATA drive over the PATA drive?
a SATA hard drive can be connected to and controlled by a SAS hard drive controller
Disadvantages of network security?
Disadvantages Of Cyber Security .
1. Improved hacker speed and ability.
2. Interconnected computers.
3. Improved viruses, malware and worms.
4. Increase in "cyberwarefare" possibly
5. More annomitty between hackers.
Can you have a dynamic Mac address?
In general, the MAC address is tied to a specific piece of hardware and does not change. It is possible, however, under certain circumstances to change the MAC address.
MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address. It may also be known as an Ethernet hardware address (EHA), hardware address or physical address.
Although intended to be a permanent and globally unique identification, it is possible to change the MAC address on most modern hardware. Changing MAC addresses is necessary in network virtualization. In this case, the MAC address of the actual NIC is hidden from the network and the network only sees the MAC assigned to the virtual NIC - which can be configured, with some finesse, to be dynamic. It can also be used in the process of exploiting security vulnerabilities. This is called MAC spoofing.
In very simple words, A leased line is a rent paying line; as the name suggests.
As it is very difficult to connect two different point in far flange areas, a customer uses a line that is provided by some network provider and pays accordingly.You can take it as connecting some of your database in two different cities.
Hope, you understand me :)
What program can capture packets on a network?
A packet capture (or sniffer) program sees packets coming into and out of the NIC (network interface card). It saves it for later analysis and use. These capture programs can be used to analyze traffic, look for problems, or be used for looking at data coming across the network.
remote access is where a computer is used from a different location to where the user is, this is useful to IT staff so they can administer a machine without even being in the same building, home users also benefit from remote access by being able to 'dial in' to their home computers whist at work or elsewhere.
* A means of burdening or effectively shutting down a remote system by bombarding it with traffic from many other computers. ...
www.antispywarecoalition.org/documents/GlossaryJune292006.htm * A type of denial of service attack in which an attacker uses malicious code installed on various computers to attack a single target. This methods may be used by an attacker to have a greater effect on the target than is possible with a single attacking machine.
www.imvajra.com/glossary1.html * A type of external Internet attack, in which multiple sources attack a single target system, with the goal being denial of service for its users. ...
www.drcomputer.com/glossary.html * On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby ...
www.primode.com/glossary.html * Acronym for Distributed Denial of Service attack. An attack on a remote destination with a collection of PCs often under the control of a virus or ...
www.pctechbytes.com/glossary/d.htm * Distributed Denial-of-Service Attack The act of loading malignant code onto a host of other machines in order to perform a Denial-of-Service attack.
substratum.ca/subs/Resources/TechTerms/ * A Distributed Denial of Service attack; a DoS attack that originates from many different (geographically and network topographically) sources, on ...
en.wiktionary.org/wiki/DDOS
Where can one find information about Network Security Service?
One can find information about network security services on various websites Barracuda and Q1Labs. Both websites offer a great amount of information regarding this subject.
Why is security such a significant concern when using remote access servers on a network?
Remote access gives an attacker an opportunity to get into your server. And usually they get root access aswell, due to the fact its normally only admins who remotely log into servers. For example, something that happened me a few years back, I was at a relatives house when I got a call saying that a certain user forgot their password and couldn't get on the network. I logged into the server from my relatives computer, and gave the user a new password. But I didn't know there was a keylogger on my relatives computer. The following week the network AD was wiped out. The person who planted the keylogger had instantly gotten root.
(IF looking for Network+ Guide to Networking answer use this one)
Access servers enable computers to dial in to a network and obtain access to its resources, thereby exposing the network to the outside world.
Different types of networking operating systems uses different digital languages to control the communication process between the computers. These languages is called Network protocols.
Definition : A protocol is a set of rules to govern the data transfer between the devices. The rules are used for the following purposes.
1. For compressing the data.
2. For sending device to indicate that it has finished sending a message.
3. For receiving device to indicate that it has received a message.
Types of Protocols :
There are different types of Protocol such as:
1. Transmission control Protocol (TCP)
2. Internet Protocol (IP)
3. Internet Address Protocol (IP Address)
4. Post office Protocol (POP)
5. Simple mail transport Protocol (SMTP)
6. File Transfer Protocol (FTP)
7. Hyper Text Transfer Protocol (HTTP)
8. Ethernet
9. Telnet
10. Gopher
1. Transmission control Protocol (TCP)
This is a communication protocol that computers uses to communicate over a network. TCP divides message into stream of packets which are sent and then reassembled at the destination.
2. Internet Protocol (IP)
Internet protocol is addressing protocol. It is always used together with TCP. IP addresses of packet, routes them through different nodes and networks until it reaches its final destination. TCP/IP is perhaps the most used standard protocol for connecting computer networks.
3. Internet Address Protocol (IP Address)
This is the address that identifies a computer on a network using TCP/IP. An IP address contains series of four numbers unique to the computer concerned Eg : 90.399.424.34. This address is usually supplied by a Internet Service Provider.
4. Post office Protocol (POP)
This is used to receive incoming E-mail .
5. Simple mail transport Protocol (SMTP)
This protocol is used for sending and distributing outgoing E-Mail .
6. File Transfer Protocol (FTP)
This is a system that allows users to transfer files from one computer to another computer. Files that can be transfered may include program files, text files and multimedia files ect. This method of file transfer is faster than that using HTTP.
7. Hyper Text Transfer Protocol (HTTP)
HTTP is used to transfer a hyper text between two or more computers. Hyper text is the text that is coded using the language called HTML. HTML codes are used to create links. This link may be in any format such as text or graphics.
HTTP is based on the Client/server principles. HTTP allows a client to establish connection with a server and make a request. The server accepts the connection initiated by the client and send back the response. An HTTP request identifies the resources that the client is interested it and tells the server what action to take on the resource.
8. Ethernet
Ethernet is a most popular protocol used for LAN communication. It transfer the information in digital packets. Every computer that uses this protocol contains the Ethernet Network Interface Card (NIC).
This card is an unique address code embedded in microchip. This address is used to identify the system. When a packet is placed on a network, The packet is sent to every computer on the networks but only the computer which has the same address as Network Interface Card address is allowed to claim that packet and receive the digital information contained with it.
Only one packet is placed at a time in the network. If two systems placed packets on the network on same time. When NIC tries to place a packet it first looks whether a packet already exit or not. If it exits the NIC is forced to wait for a random milliseconds before trying again. This continues until a 'gap' is found then the packet can be successfully transmitted on to a network.
9. Telnet
Telnet is a set of rules used to connect one computer to another computer. The process of this connection is called as remote login. The computer who request connection is called local computer, who accept the connection is called remote computer. If you type commands in local computer remote login these commands executed in the remote computer. You can see in your monitor what is the process going on in this remote computer.
Telnet also operates on the client/server principle. The establishment of connection and display data on the local computer uses a Telnet server program to accept the connection and send responses to requests for information back to the local computer.
10. Gopher
Gopher is a sot of rules used to search, retrieve and display documents from remote sites. It is possible to initiate on-line connections with other systems through Goper. It also operates on client/server principal
.
Did you like this resource? Share it with your friends and show your love!
inShare