Software Training Videos In Telugu
Software Training Videos In Telugu
Blog Archive
-
2011
(42)
- October(15)
-
September(27)
- Find Specific Types of Systems
- Mirror Website
- Command-Line Whois Searches
- Query Whois Databases
- Network Reconnaissance & DNS Search
- TerraServer is a commercial website[1] specializin...
- Find Information by the Target (Edgar)
- Typical Vulnerability Life Cycle
- Ec-Council Certified Security Analyst and Licensed...
- Career Academy Hacking, Penetration Testing and Co...
- Footprinting/Reconnaissance
- skill set
- Network Layer of the OSI Model
- Data Link Layer of the OSI Model
- Physical Layer of the OSI Model
- layers of osi
- The OSI Model
- Reading terms
- TCP Header format
- google terms
- google search terms
- Information Security / IT Audit - Executive / Sr E...
- Application Security Specialist - C++/Java for Top...
- Consultant & Assoc. Consultant VAPT
- Security Testing, Audit
- Information Security Analyst
- Common Responsibilities for Information Security J...
Monday, 26 September 2011
Reading terms
- port numbers are decided by a body called IANA or Internet Assigned Numbers Association
- Check RFC 1777 for a complete list of Port numbers
- SYN-Flooding is a Denial of Service technique that exploits a flaw in the implementation of TCP/IP on most UNIX machines
- The Point-to-Point Protocol (PPP), documented in RFC 1661, is currently (early 1996) the best solution for dial-up Internet connections, including ISDN.
- Ethernet there is only one cable that passes through the NIC's (Network Interface Cards) of all the computers on the LAN. There is no master and no slave, no server and no client (at the data link layer). All the machines have equal priority. Each card on each and every computer has it's own 48 bit Ethernet address which, like an IP address, is unique. To send a TCP/IP packet over an Ethernet LAN is simplicity itself
Labels:
notes
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment