Root-kits are malicious programs that give Internet attackers unlimited access to a system while hiding their presence at the same time. Rootkits, after accessing a system (usually exploiting a system vulnerability) use operating system features to avoid detection by antivirus software. Rootkit features: 1. System utilities and daemons have identical behavior to original programs. 2. Additional...
The RED algorithm
The RED algorithm is also known as Random Early Discard or Random Early Drop. This algorithm works at the router level. Congestion in computer networks must be discovered and fought from an early stage in order not to have an overloaded queue at the exit, which would eventually lead to blockage of the entire network. The goals we must have if we are confronted with a congested network are: 1. An...
DCCP – Datagram Congestion Control Protocol
Congestion of the network is a phenomenon which consists of deterioration of the quality of services caused by the overloading of network nodes, so the term is associated primarily with large networks, in which large amounts of data are being transmitted. Congestion has several causes: either the routers are not fast enough, their CPUs are too slow, and they do not manage to quit queuing queues...
Rights and capabilities in Linux
1. Primary access rights in Linux 2. Capabilities in Linux 3. Testing capabilities in Linux 1. Primary access rights in Linux. In Linux, the primary access rights to a file are visible after the ls call with the -l option. These can be seen in the first field of an entry corresponding to a file. This 10-character field is made up of four sub-fields. The first sub-field consists of a single...
What is vsftpd or Very Secure FTP Daemon
The File Transfer Protocol or FTP is a protocol used to access files on servers from private computer networks or the Internet. FTP has been used since 1985 and is now widely used. Many FTP servers around the world allow you to connect to them anywhere on the Internet, and files placed on them are then transferred (uploaded or downloaded). Very Secure FTP Daemon does not bring significant changes...
What is MD5
MD5 (Message Digest Algorithm 5) is a unidirectional hash-like cryptographic function that delivers a fixed 128-bit length value. The value calculated using the MD5 function (shortly md5sum) is widely used as a check amount when checking the integrity of the files. The MD5 algorithm It is the latest in a series of algorithms designed by Ronald Rivest, a professor at the Massachusetts Institute of...
What is SMTP
A network protocol is a set of rules that computers must follow to change the information in a network. Network protocols that operate on the Internet are part of the suite of Internet protocols. Unlike most Internet protocols that need to be explained at the network packet level, email protocols are simple command/response protocols that can be understood and easy to handle. SMTP (Simple Mail...
What is Netstat
The Netstat command is one of the most powerful utilities that are offered in search of a secure network configuration. Although the process table will show that daemons have been launched from the command line, and the /etc/inetd.conf file shows you those that are controlled by inetd, the netstat command is the last “authority” in port diagnostics that the Linux server listen to them...
What is inetd
Inetd is a super-server daemon found on many UNIX systems. It first appeared on BSD version 4.3 and is usually located in /usr/sbin/inetd. Before discussing the inetd process, I want to explain that in Linux and Unix, the processes running in the background are called daemons. In popular culture, a daemon is a spirit that influences the character or personality. Coming back to inetd, at first...
What is the RTCP protocol
RTCP is a protocol that only deals with answers, syncing data, and the user interface but does not carry data at all, and is closely related to RTP. RTP delivers the actual data, while RTCP is used to send control packets to participants in a call. The primary function is to provide reports on the quality of the services provided by RTP. The first feature provides feedback to sources about...