Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. ARP spoofing - Wikipedia

    en.wikipedia.org/wiki/ARP_spoofing

    In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends ( spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the attacker's MAC address with the IP address of another host, such as the default gateway, causing any ...

  3. MAC flooding - Wikipedia

    en.wikipedia.org/wiki/MAC_flooding

    MAC flooding. In computer networking, a media access control attack or MAC flooding is a technique employed to compromise the security of network switches. The attack works by forcing legitimate MAC table contents out of the switch and forcing a unicast flooding behavior potentially sending sensitive information to portions of the network where ...

  4. Internet Group Management Protocol - Wikipedia

    en.wikipedia.org/wiki/Internet_Group_Management...

    e. The Internet Group Management Protocol ( IGMP) is a communications protocol used by hosts and adjacent routers on IPv4 networks to establish multicast group memberships. IGMP is an integral part of IP multicast and allows the network to direct multicast transmissions only to hosts that have requested them.

  5. DNS spoofing - Wikipedia

    en.wikipedia.org/wiki/DNS_spoofing

    DNS spoofing. DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver 's cache, causing the name server to return an incorrect result record, e.g. an IP address. This results in traffic being diverted to any computer that the ...

  6. Multicast address - Wikipedia

    en.wikipedia.org/wiki/Multicast_address

    In support of link-local multicasts which do not use IGMP, any IPv4 multicast address that falls within the *.0.0.0 / 24 and *.128.0.0 / 24 ranges will be broadcast to all ports on many Ethernet switches, even if IGMP snooping is enabled, so addresses within these ranges should be avoided on Ethernet networks where the functionality of IGMP ...

  7. VoIP vulnerabilities - Wikipedia

    en.wikipedia.org/wiki/VoIP_vulnerabilities

    VoIP vulnerabilities are weaknesses in the VoIP protocol or its implementations that expose users to privacy violations and other problems. VoIP is a group of technologies that enable voice calls online. VoIP contains similar vulnerabilities to those of other internet use. Risks are not usually mentioned to potential customers. [1]

  8. IP code - Wikipedia

    en.wikipedia.org/wiki/IP_Code

    The IP code or ingress protection code indicates how well a device is protected against water and dust. It is defined by the International Electrotechnical Commission (IEC) under the international standard IEC 60529 [1] which classifies and provides a guideline to the degree of protection provided by mechanical casings and electrical enclosures ...

  9. Multicast Listener Discovery - Wikipedia

    en.wikipedia.org/wiki/Multicast_Listener_Discovery

    v. t. e. Multicast Listener Discovery ( MLD) is a component of the Internet Protocol Version 6 (IPv6) suite. MLD is used by IPv6 routers for discovering multicast listeners on a directly attached link, much like Internet Group Management Protocol (IGMP) is used in IPv4. The protocol is embedded in ICMPv6 instead of using a separate protocol.