Dns cache poisoning, Computer Networking

DNS cache poisoning

The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers to the attack which comprises of the process of developing the DNS server cache of false information. This process generally maintains the record which will enable to maintain the wrong IP address. With DNS cache poisoning, the hacker can move the process of can control the process of handling all the incoming outgoing services of the DNS in terms of name resolution. The hacker can direct the specific address on the arrival of any request by the user. For example, if the user wants to access google.com, the hacker can direct him a page which cans google.com/something_.htm or simple another malicious web page. Relates to an attack consisting of making a DNS server.

Posted Date: 3/1/2013 3:01:48 AM | Location : United States







Related Discussions:- Dns cache poisoning, Assignment Help, Ask Question on Dns cache poisoning, Get Answer, Expert's Help, Dns cache poisoning Discussions

Write discussion on Dns cache poisoning
Your posts are moderated
Related Questions
Random effects are the effects attributable to an infinite set of levels of the factor, of which only the random sample occur in the data. For example, the investigator may want t

What is the client side of applications To build the client side of applications, developers use various tools. Some of the popular software development environments include Vi

Output Port The function of the  port is  take  the packets that have  been stored in the out  put port  memory and transmits them over the out going  link. The queuing  and bu


Q. Show Data link and Physical vs Subnet? - Data link layer The function of the Data Link Layer is -offers for the control of the physical layer and detects and possib

Post Office Protocol and Lightweight Directory Access Protocol POP: Post Office Protocol is a used by mail clients to download messages from a mail server on the Internet. L

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

Control Frames for Lost Tokens If station goes down ... token lost Predecessor listens for data frame or token Noticing none, retransmits token Sends whofoll

In formation  sharing at  regular intervals For example  every 30 seconds each router sends its information  about the  whole  network  to its  neighbours. This sharing  occurs

1. Bob has been given the task of changing the IP address and enabling telnet access on a CISCO 2950 enterprise switch. The current IP address is 10.10.10.2/8 the new IP address