Last Articles


Most popular password

Network Information Security: Myths and Realities Omnipotence hackers

Hackers and crackers, or what is good and what is bad?

Chronology of the ARPANET - INTERNET

Protection system in Windows - Fact or Fiction

The basic principles of security

Manager SAM and Active Directory

Administrative boundaries: the forest or domain?

Can you trust a domain that is connected to the Internet?

Идентификаторы защиты (SID)

Why can not I log in as an administrator from any location?

Network security model and resource sharing

Remote attacks on distributed computing systems

Characteristics and mechanisms of implementation of standard remote attacks

Fake ARP-server on the Internet

False DNS-server on the Internet

Substitution of one of the subjects TCP-connections on the Internet

Malfunction host on the network

Mythical remote attacks on the Internet

Dedicated channel communication between objects distributed CS

Fake ARP-server on the Internet

  As repeatedly emphasized in computer networks, communication between two remote hosts may involve sending network messages, which are enclosed in packets exchange. In general, the packet transmitted over the network regardless of protocol used and the type of network (Token Ring, Ethernet, X.25, etc.) consists of a packet header and data fields. In the packet header is usually entered the service information, depending on the software protocol and required to address the package, its identification, transformation, etc.

   In the data field are placed either directly to the data, or other package of higher-level OSI. For example, the packet transport layer can be embedded into the packet network level, which, in turn, is embedded in the packet data link layer. Sproe-to classify this statement to the network operating system that use the TCP / IP, it can be argued that the package of TCP (transport layer) is embedded in the package IP (network layer), which, in turn, is embedded in the package Ethernet (link layer).

Top 5 most read

The basic rules of safe behavior on the Internet

Manager SAM and Active Directory

You forget your password. What should I do? Part 3

Идентификаторы защиты (SID)

Social engineering as a way of committing crimes in the sphere of computer information

Copyright © 2010 BRV ISTCOM S.R.L.- раскрутка сайта