Latest stories

Different types of system calls

D

Based on the number of system calls the operating system is requesting, the interface between the operating system and the user programs is defined. To understand exactly what the operating system is doing, we need to look closely at this interface. The system calls provided by the interface vary from one operating system to another. In the following sections, we will examine some of the most...

What is a hyperlink

W

A hyperlink or shorter link is a reference, link, navigation element in an electronic document to other parts of the same document, other documents or sections of other documents to which a user is sent when accessing the navigation element. More technically expressed, a hyperlink is a reference in hypertext, which makes it possible to perform a leap to another electronic document or to another...

GCC-GNU Compiler Collection

G

The GNU Compiler Collection is a set of compilers for various programming languages ​​produced by the GNU Project. GCC has been adopted as the standard compiler for most of the Unix-like operating systems, including Linux, BSD, and Mac OS X. GCC is one of the first software packages developed by the Free Software Foundation within the GNU Project (Gnu’s Not Unix). The GNU Project was...

Cryptographic puzzles

C

Cryptographic puzzles are a method of protecting against DoS attacks. The idea behind cryptographic puzzles is the following: for a client to connect to a server under attack, he must solve a mathematical puzzle. The difficulty of the puzzle will be directly proportional to the number of connections initiated by the client. Thus, a legitimate client will not notice a big difference when...

What is Hijacking

W

Hijacking performs the act of hijacking packages on the desired route, an attacker thus taking control of one of the communication nodes. It is one of the most elaborate types of computer attacks that can be encountered in industrial networks. As with RST and SYN flood attacks, this attack is based on TCP packet transmission that contains false values ​​for address, port, and sequence or...

Phishing and pharming attacks

P

This type of attack is aimed at obtaining personal information (such as usernames, passwords, credit card details) by impersonating an entity that the user trusts. These attacks are usually done through email, e-mail, or social networking. Thus, in the case of phishing attacks, the attacker sends a message that contains a link to a web page that mimics the original page where the user trusts...

What are DDoS attacks

W

DoS (Denial of Service) or DDoS (Distributed Denial of Service) attacks are a way to make computational resources unavailable to legitimate users. Although the methods by which these attacks are made are very varied, these types of attacks are designed to make a web page or web service work heavily or not at all. A DoS attack can be defined as an attack targeting the availability of a computer or...

What is a sniffer

W

A sniffer is a computer program used to monitor and analyze network traffic from one network location to another. A sniffer captures each packet of information, decodes it and gives the owner the ability to view the content. If a sniffer is used by a trusted person, it is not considered a malicious application because it is used for troubleshooting and monitoring purposes, or to detect network...

What is SSL and TLS

W

SSL (Secure Sockets Layer) is an acronym that is a Netscape web protocol designed to transmit securely private documents over the Internet. To encrypt data, SSL uses a two-key cryptographic system: a public one, known by anyone, and a private, secret, known only by the recipient of the message. Several updates of this protocol have been offered, today the latest version being SSL 3.0, becoming...

What is a honeypot

W

A recent technique of fighting network attackers consists of stretching three types of strategies: 1. Baits: creating a unique user account with a simple password (user: guest, password: guest); any attacker who connects to this account is closely monitored. 2. Traps: Install and configure an operating system with the most common security flaws and vulnerabilities, easy to find, to catch...

Recent Posts

Archives

Categories