Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Domain Name System - Wikipedia

    en.wikipedia.org/wiki/Domain_Name_System

    The Domain Name System ( DNS) is a hierarchical and distributed name service that provides a naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names (identification strings) assigned to each of the associated entities.

  3. Packet Tracer - Wikipedia

    en.wikipedia.org/wiki/Packet_Tracer

    Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface. Packet Tracer makes use of a drag and drop user ...

  4. nslookup - Wikipedia

    en.wikipedia.org/wiki/Nslookup

    The - (minus sign) invokes subcommands which are specified on the command line and should precede nslookup commands. In non-interactive mode, i.e. when the first argument is a name or Internet address of the host being searched, parameters and the query are specified as command line arguments in the invocation of the program.

  5. Smurf attack - Wikipedia

    en.wikipedia.org/wiki/Smurf_attack

    Smurf attack. A Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address. [1] Most devices on a network will, by default, respond to this by sending a reply to ...

  6. Extension Mechanisms for DNS - Wikipedia

    en.wikipedia.org/wiki/Extension_mechanisms_for_DNS

    Extension Mechanisms for DNS ( EDNS) is a specification for expanding the size of several parameters of the Domain Name System (DNS) protocol which had size restrictions that the Internet engineering community deemed too limited for increasing functionality of the protocol. The first set of extensions was published in 1999 by the Internet ...

  7. Snort (software) - Wikipedia

    en.wikipedia.org/wiki/Snort_(software)

    The program can also be used to detect probes or attacks, including, but not limited to, operating system fingerprinting attempts, semantic URL attacks, buffer overflows, server message block probes, and stealth port scans. Snort can be configured in three main modes: 1. sniffer, 2. packet logger, and 3. network intrusion detection.

  8. Server Message Block - Wikipedia

    en.wikipedia.org/wiki/Server_Message_Block

    Server Message Block (SMB) enables file sharing, printer sharing, network browsing, and inter-process communication (through named pipes) over a computer network. SMB serves as the basis for Microsoft's Distributed File System implementation. SMB relies on the TCP and IP protocols for transport. This combination allows file sharing over complex ...

  9. Domain Name System blocklist - Wikipedia

    en.wikipedia.org/wiki/Domain_Name_System_blocklist

    A Domain Name System blocklist, Domain Name System-based blackhole list, Domain Name System blacklist ( DNSBL) or real-time blackhole list ( RBL) is a service for operation of mail servers to perform a check via a Domain Name System (DNS) query whether a sending host's IP address is blacklisted for email spam. [1]