Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. DNS spoofing - Wikipedia

    en.wikipedia.org/wiki/DNS_spoofing

    DNS spoofing. DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver 's cache, causing the name server to return an incorrect result record, e.g. an IP address. This results in traffic being diverted to any computer that the ...

  3. DNS hijacking - Wikipedia

    en.wikipedia.org/wiki/DNS_hijacking

    DNS hijacking, DNS poisoning, or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achieved by malware that overrides a computer's TCP/IP configuration to point at a rogue DNS server under the control of an attacker, or through modifying the behaviour of a trusted DNS server so that it does not comply with internet standards.

  4. Spoofing attack - Wikipedia

    en.wikipedia.org/wiki/Spoofing_attack

    Spoofing attack. In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. [1]

  5. Website spoofing - Wikipedia

    en.wikipedia.org/wiki/Website_spoofing

    DNS is the layer at which botnets control drones. In 2006, OpenDNS began offering a free service to prevent users from entering website spoofing sites. Essentially, OpenDNS has gathered a large database from various anti-phishing and anti-botnet organizations as well as its own data to compile a list of known website spoofing offenders.

  6. DNS rebinding - Wikipedia

    en.wikipedia.org/wiki/DNS_rebinding

    DNS rebinding is a method of manipulating resolution of domain names that is commonly used as a form of computer attack. In this attack, a malicious web page causes visitors to run a client-side script that attacks machines elsewhere on the network. In theory, the same-origin policy prevents this from happening: client-side scripts are only ...

  7. IDN homograph attack - Wikipedia

    en.wikipedia.org/wiki/IDN_homograph_attack

    An example of an IDN homograph attack; the Latin letters "e" and "a" are replaced with the Cyrillic letters "е" and "а". The internationalized domain name (IDN) homograph attack is a way a malicious party may deceive computer users about what remote system they are communicating with, by exploiting the fact that many different characters look alike (i.e., they are homographs, hence the term ...

  8. DNS blocking - Wikipedia

    en.wikipedia.org/wiki/DNS_blocking

    DNS blocking. Domain Name System blocking, or DNS blocking / filtering, is a strategy for making it difficult for users to locate specific domains or websites on the Internet. It was first introduced in 1997 as a means to block spam email from known malicious IP addresses. [1]

  9. Pharming - Wikipedia

    en.wikipedia.org/wiki/Pharming

    Pharming [a] is a cyberattack intended to redirect a website 's traffic to another, fake site by installing a malicious program on the victim's computer in order to gain access to it. [citation needed] Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software.