Dns cache poisoning, Computer Networking

DNS cache poisoning

The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers to the attack which comprises of the process of developing the DNS server cache of false information. This process generally maintains the record which will enable to maintain the wrong IP address. With DNS cache poisoning, the hacker can move the process of can control the process of handling all the incoming outgoing services of the DNS in terms of name resolution. The hacker can direct the specific address on the arrival of any request by the user. For example, if the user wants to access google.com, the hacker can direct him a page which cans google.com/something_.htm or simple another malicious web page. Relates to an attack consisting of making a DNS server.

Posted Date: 3/1/2013 3:01:48 AM | Location : United States







Related Discussions:- Dns cache poisoning, Assignment Help, Ask Question on Dns cache poisoning, Get Answer, Expert's Help, Dns cache poisoning Discussions

Write discussion on Dns cache poisoning
Your posts are moderated
Related Questions
what is max length of cable I can use

How Intranets encourage integration of applications Intranets encourage integration of applications; such as the simple word processing application could be easily linked with

bus topology disadvantage?

Question: (a) What do you understand by the following terms related to LCDs: Reflective LCDs Backlit LCDs (b) By using an example, explain the main steps of the B


Question : a) Describe the following core components of a cellular based network: i) Cell ii) MSC iii) HLR & VLR iv) PSTN b) Explain why frequency reuse is consi

Determine the task which should intranet require Intranet to work smoothly, the following tasks should be properly synchronised: All computers connected together in a n

With a database server, the client gives SQL requests as messages to the database server. The results of every SQL command are returned over the network. The server uses its own pr

Router A router is used to route (transfer) data among two or more same networks. It verifies the next network point to which a data packet should be forwarded. The router is l

QUESTION a) Security is a very crucial component in a Distributed System. Describe three properties of a secure channel. b) During packet transmission, messages are subdivid