Dns cache poisoning, Computer Networking

DNS cache poisoning

The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers to the attack which comprises of the process of developing the DNS server cache of false information. This process generally maintains the record which will enable to maintain the wrong IP address. With DNS cache poisoning, the hacker can move the process of can control the process of handling all the incoming outgoing services of the DNS in terms of name resolution. The hacker can direct the specific address on the arrival of any request by the user. For example, if the user wants to access google.com, the hacker can direct him a page which cans google.com/something_.htm or simple another malicious web page. Relates to an attack consisting of making a DNS server.

Posted Date: 3/1/2013 3:01:48 AM | Location : United States







Related Discussions:- Dns cache poisoning, Assignment Help, Ask Question on Dns cache poisoning, Get Answer, Expert's Help, Dns cache poisoning Discussions

Write discussion on Dns cache poisoning
Your posts are moderated
Related Questions
Q. What is Cross over cable? - Cross the critical pair to properly transmit, align and receive signals on devices with like connections. - Pin 1 connected to pin 3 as well a

There are two dominant forms of building distributed systems: client-server systems, i.e. systems in which one machine acts as a server and act as clients; and peer-to-peer systems

Options Negotiation To use any of the options first  requires option  negotiation between the client  and server. Four  control  characters are used for  this purpose.

Process communicating End   systems  communicate with each  other by the  processes. A process  can be  thought  of a s program  that is  running  within  end systems. Process

Question 1 Differentiate LAN and WAN Question 2 Explain the TCP/IP Reference Model with diagram Question 3 Describe Circuit switching and message switching Question

The distance over which data moves within a computer may differ from a few thousandths of an inch, as is the case within a one IC chip, to as much as lot of feet along the backplan

Q. Explain the Types of Security Service? Security Services fall into one of the subsequent categories - Confidentiality: Confirms that the info in a system and transm

A default route is used if there is not a particular entry in the routing table for the destination.

Network Protocols In computer  networks  communication  occurs between  the entities in different  systems an entity  is anything  that is  capable  of sending  or receiving

The marketing term 'ISDN modem' was formed to help sell the ISDN idea to America. There is no such thing as an analog modulator demodulator for digital ISDN. The Terminal Adapter (