Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Captive portal - Wikipedia

    en.wikipedia.org/wiki/Captive_portal

    In a captive portal, the firewall will make sure that only the DNS server(s) provided by the network's DHCP can be used by unauthenticated clients (or, alternatively, it will forward all DNS requests by unauthenticated clients to that DNS server). This DNS server will return the IP address of the captive portal page as a result of all DNS lookups.

  3. Network Access Control - Wikipedia

    en.wikipedia.org/wiki/Network_Access_Control

    Network access control is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. [3] NAC might integrate the automatic remediation process (fixing non-compliant nodes before allowing access ...

  4. Visitor Based Network - Wikipedia

    en.wikipedia.org/wiki/Visitor_Based_Network

    A Visitor-based network (VBN) is a computer network intended for mobile users in need of temporary Internet access. A visitor-based network is most commonly established in hotels, airports, convention centers, universities, and business offices. It gives the on-the-go user a quick and painless way to temporarily connect a device to networks and ...

  5. Evil twin (wireless networks) - Wikipedia

    en.wikipedia.org/wiki/Evil_twin_(wireless_networks)

    Using captive portals. One of the most commonly used attacks under evil twins is a captive portal. At first, the attacker would create a fake wireless access point that has a similar Essid to the legitimate access point. The attacker then might execute a denial-of-service attack on the legitimate access point which will cause it to go offline ...

  6. Dynamic Host Configuration Protocol - Wikipedia

    en.wikipedia.org/wiki/Dynamic_Host_Configuration...

    v. t. e. The Dynamic Host Configuration Protocol ( DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture. [1]

  7. IP address - Wikipedia

    en.wikipedia.org/wiki/IP_address

    An Internet Protocol address ( IP address) is a numerical label such as 192.0.2.1 that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. [1] [2] IP addresses serve two main functions: network interface identification, and location addressing .

  8. IPFire - Wikipedia

    en.wikipedia.org/wiki/IPFire

    Captive Portal; IPFire Location. The IPFire Project built a free Internet geolocation database published under the Creative Commons license. It is being used by The Tor Project to identify the location of Tor nodes and relays. See also. Free and open-source software portal; Comparison of firewalls; List of router and firewall distributions

  9. pfSense - Wikipedia

    en.wikipedia.org/wiki/PfSense

    pfSense. pfSense is a firewall / router computer software distribution based on FreeBSD. The open source pfSense Community Edition (CE) and pfSense Plus is installed on a physical computer or a virtual machine to make a dedicated firewall/router for a network. [3] It can be configured and upgraded through a web-based interface, and requires no ...