Dns cache poisoning, Computer Networking

DNS cache poisoning

The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers to the attack which comprises of the process of developing the DNS server cache of false information. This process generally maintains the record which will enable to maintain the wrong IP address. With DNS cache poisoning, the hacker can move the process of can control the process of handling all the incoming outgoing services of the DNS in terms of name resolution. The hacker can direct the specific address on the arrival of any request by the user. For example, if the user wants to access google.com, the hacker can direct him a page which cans google.com/something_.htm or simple another malicious web page. Relates to an attack consisting of making a DNS server.

Posted Date: 3/1/2013 3:01:48 AM | Location : United States

Related Discussions:- Dns cache poisoning, Assignment Help, Ask Question on Dns cache poisoning, Get Answer, Expert's Help, Dns cache poisoning Discussions

Write discussion on Dns cache poisoning
Your posts are moderated
Related Questions
Computer Networking 1. Explain different network structures in use. 2. Elaborate the architecture and usage of ISDN. 3. Discuss the concept of framing in Data Link Layer

What is the Network Time Protocol? A protocol that makes sures accurate local timekeeping with reference to radio and atomic clocks located on the Internet. This protocol is c

How do we explain the method of DPU, Segments, Datagram, Frame and  packet?

5. Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frame are 25 bytes long. Calculate the efficiency of Stop-and-Wait ARQ in a system t

Write the layer on which layer does L2F, PPTP and L2TP operate?

Explain the working of Transceivers Transceivers are used to connect nodes to the several Ethernet media. Most computers and network interface cards having a built-in 10BaseT o

BRDGING BETWEEN BUILDINGS:  If two buildings are placed far from each other, a bridge, a pair of fiber modems and an optical fiber may be used to locate two LANs as given in t

what is variable ip address

Create and simulate a network similar to the one shown here, using the NetML system. The network is a little more complex, as depicted at the right. There is an extra node

It treats all processors as equivalent. Any processor can do the work of any other processor. Applications are separated into threads that can run simultaneously on any available p