Dns tunneling – domain name server, Computer Networking

DNS Tunneling – Domain Name Server

"If, on one system, it is possible to transmit bits to another in any form, and in turn receive a reply as a result of that transmission, then it is inherently impossible to effectively limit or censor the flow of data between them."

The mechanism for DNS tunnel comprises of binding or can say encapsulating the binary data within DNS queries and replies in order to implement the DNS name lookup itself , using base32 and base64 encoding, in order to enable the bi-directional carrier for the data. Hence, the user may also tunnel the data simultaneously to remote system, while domain name lookups on a network.

Posted Date: 3/1/2013 3:07:14 AM | Location : United States

Related Discussions:- Dns tunneling – domain name server, Assignment Help, Ask Question on Dns tunneling – domain name server, Get Answer, Expert's Help, Dns tunneling – domain name server Discussions

Write discussion on Dns tunneling – domain name server
Your posts are moderated
Related Questions
Q. How is computer networks used in sales and marketing?  Marketing and sales:   Computer networks are used extensively in both marketing and sales organizations. Marketing pr

As configuring of VLANs helps in controlling the size of broadcast domains. There are some key components of inter-VLAN routing such as VLAN capable switch Router Ro

What is logical link control? One of two sublayers of the data link layer of OSI reference model, as explained by the IEEE 802 standard. This sublayer is responsible for mainta

Intrinsic Functions HPF introduces some new intrinsic functions in addition to those defined in F90. The two most regularly used in parallel programming are the system inquiry

What is anonymous FTP and why would you use it Anonymous FTP enables users to join to a host without using a valid login and password. Generally, anonymous FTP uses a login kno

What is a TP Monitor? There is no commonly accepted explanation for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".

Question : a) Explain why pervasive computing can be termed as a "technology that disappears". b) List and briefly explain four main components of a MOTE used in Wireless

Q. Illustrate Data-Link Layer in osi layers model? Data-Link Layer: This layer takes the data messages or frames from the Network Layer and gives for their actual transmissio

Diiferentiate between HTML and HTTP Hypertext Markup Language (HTML) The language used in writing pages for the World Wide Web. Knowledge of not HTML is not necessary f

TCP creates a reliable data transfer service, in addition to IP''s unreliable best-effort service. Study the related sections of the text, and in your own words, summarize how TCP