Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Captive portal - Wikipedia

    en.wikipedia.org/wiki/Captive_portal

    In a captive portal, the firewall will make sure that only the DNS server(s) provided by the network's DHCP can be used by unauthenticated clients (or, alternatively, it will forward all DNS requests by unauthenticated clients to that DNS server). This DNS server will return the IP address of the captive portal page as a result of all DNS lookups.

  3. Network access control - Wikipedia

    en.wikipedia.org/wiki/Network_Access_Control

    Network access control is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. [3] NAC might integrate the automatic remediation process (fixing non-compliant nodes before allowing access ...

  4. DNS hijacking - Wikipedia

    en.wikipedia.org/wiki/DNS_hijacking

    DNS hijacking, DNS poisoning, or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. [1] This can be achieved by malware that overrides a computer's TCP/IP configuration to point at a rogue DNS server under the control of an attacker, or through modifying the behaviour of a trusted DNS server so that it does not comply with internet standards.

  5. Evil twin (wireless networks) - Wikipedia

    en.wikipedia.org/wiki/Evil_twin_(wireless_networks)

    One of the most commonly used attacks under evil twins is a captive portal. At first, the attacker would create a fake wireless access point that has a similar Essid to the legitimate access point. The attacker then might execute a denial-of-service attack on the legitimate access point which will cause it to go offline. From then on, clients ...

  6. WISPr - Wikipedia

    en.wikipedia.org/wiki/WISPr

    WISPr. WISPr (pronounced "whisper") or Wireless Internet Service Provider roaming is a draft protocol submitted to the Wi-Fi Alliance [citation needed] that allows users to roam between wireless internet service providers in a fashion similar to that which allows cellphone users to roam between carriers. A RADIUS server is used to authenticate ...

  7. Visitor Based Network - Wikipedia

    en.wikipedia.org/wiki/Visitor_Based_Network

    A Visitor-based network (VBN) is a computer network intended for mobile users in need of temporary Internet access. A visitor-based network is most commonly established in hotels, airports, convention centers, universities, and business offices. It gives the on-the-go user a quick and painless way to temporarily connect a device to networks and ...

  8. List of router and firewall distributions - Wikipedia

    en.wikipedia.org/wiki/List_of_router_and...

    Free (PC) or hardware version. UTM distribution with routing, firewall, anti-spam and anti-virus for web, FTP and e-mail, OpenVPN, IPsec, captive portal functionality, and captive portal (missing in community version). Endian Firewall Community (EFW) is a complete version for x86. The anti-virus for EFW is Sophos or ClamAV.

  9. IPFire - Wikipedia

    en.wikipedia.org/wiki/IPFire

    IPFire. IPFire is a hardened [3] open source Linux distribution that primarily performs as a router and a firewall; a standalone firewall system with a web-based management console for configuration. IPFire originally started as a fork of IPCop [4] and has been rewritten on basis of Linux From Scratch since version 2. [5]