expand for answer

DNS poisoning

The act of altering or falsifying DNS information at a source location (i. e. , HOSTS file, caching DNS server, or authoritative DNS server) in order to route or misdirect legitimate traffic.


Similar items:
Pronounced cash, a special highspeed storage mechanism. It can be either a reserved section of main memory or an independent highspeed storage device. Two types of caching are commonly used in personal computers: memory caching and disk caching. A memory cache, sometimes called a cache store or RAM cache, is a portion of memory made of highspeed static RAM (SRAM) instead of the slower and cheaper dynamic RAM (DRAM) used for main memory. Memory caching is effective because most programs access the same data or instructions over and over. Disk caching works under the same principle as memory caching, but instead of using highspeed SRAM, a disk cache uses conventional main memory. When data is found in the cache, it is called a cache hit, and the effectiveness of a cache is judged by its hit rate.
[view]
The act of altering or falsifying DNS information using a rogue DNS server to send false DNS replies in order to route or misdirect legitimate traffic.
[view]
A set of communications protocols that encompasses media access, packet transport, session communications, file transfer, electronic mail, terminal emulation, remote file access, and network management. TCP/IP provides the basis for the Internet. The structure of TCP/IP is as follows: Process layer clients: FTP, Telnet, SMTP, NFS, DNS; Transport layer service providers: TCP (FTP, Telnet, SMTP), UDP (NFS, DNS); Network layer: IP (TCP, UDP); and Access layer: Ethernet (IP), Token ring (IP).
[view]
A computer that provides a service to another computer, such as a mail server, a file server, or a news server.
[view]
The process of keeping a copy of data through either shadowing or caching.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in