Dns tunneling – domain name server, Computer Networking

DNS Tunneling – Domain Name Server

"If, on one system, it is possible to transmit bits to another in any form, and in turn receive a reply as a result of that transmission, then it is inherently impossible to effectively limit or censor the flow of data between them."

The mechanism for DNS tunnel comprises of binding or can say encapsulating the binary data within DNS queries and replies in order to implement the DNS name lookup itself , using base32 and base64 encoding, in order to enable the bi-directional carrier for the data. Hence, the user may also tunnel the data simultaneously to remote system, while domain name lookups on a network.

Posted Date: 3/1/2013 3:07:14 AM | Location : United States







Related Discussions:- Dns tunneling – domain name server, Assignment Help, Ask Question on Dns tunneling – domain name server, Get Answer, Expert's Help, Dns tunneling – domain name server Discussions

Write discussion on Dns tunneling – domain name server
Your posts are moderated
Related Questions

QUESTION (a) In CSS, each element in a document is considered to be in an invisible box. Give three ways how to make the box visible (b) (i) Explain the meaning and use of t

TYPES OF WIRES:  Cable used for wiring would match the following: The intended speed The distance between computers The amount of noise Anticipated future r

- EIA/ TIA specifies and RJ-45 connector for unshielded twisted-pair (UTP) cable. The letter RJ stand for registered jack and the number 45 refers to a specific wiring sequence.

System Deadlock A deadlock refers to the situation when simultaneous processes are holding resources and preventing each other from completing their implementation. The fol

Q. Show the seven layers of ISO's OSI model? Ans:- The seven layers are given below:   -  Application Layer -  Presentation Layer -  Session Layer -  Transport Laye

802.11 CSMA/CA a) Wait a DIFS time to avoid collision b) Send RTS and wait for CTS reply to obtain the use of the Medium (air) c)  Use of SIFS time for control informatio


Reliable Data Transfer Figure illustrate the  framework for reliable  transfer. The service  abstraction provided  to the upper  layer  entities is that  of a reliable channel

1.  Detail for each of the four following MIPS instructions, which actions are being taken at each of their five steps.  Do not forget to mention how and during which steps each in