Last Articles


Most popular password

Network Information Security: Myths and Realities Omnipotence hackers

Hackers and crackers, or what is good and what is bad?

Chronology of the ARPANET - INTERNET

Protection system in Windows - Fact or Fiction

The basic principles of security

Manager SAM and Active Directory

Administrative boundaries: the forest or domain?

Can you trust a domain that is connected to the Internet?

Идентификаторы защиты (SID)

Why can not I log in as an administrator from any location?

Network security model and resource sharing

Remote attacks on distributed computing systems

Characteristics and mechanisms of implementation of standard remote attacks

Fake ARP-server on the Internet

False DNS-server on the Internet

Substitution of one of the subjects TCP-connections on the Internet

Malfunction host on the network

Mythical remote attacks on the Internet

Dedicated channel communication between objects distributed CS

Substitution of one of the subjects TCP-connections on the Internet

 Protocol TCP (Transmission Control Protocol) is one of the basic transport protocol on the Internet. This protocol allows to correct errors that may occur during packet transmission, and is a protocol with the establishment of a logical connection - a virtual channel.

  Through this channel is transmitted and received packets with the registration of their sequence, manages the flow of packets, organized by the retransmission of distorted packets, and at the end of the session channel is broken. In this case, TCP is the only basic protocol of the family of TCP / IP, with the additional identification system for messages and connection. That is why the application layer protocols FTP, TELNET, providing users with remote access to hosts Internet, are realized by using the protocol TCP.

  To identify the TCR-package in the TCP-header, there are two 32-bit identifier, which also play a role count packages.
Their names - Sequence Number and Acknowledgment Number. Also we are interested in a field called Control Bits.

  This field size of 6 bits can contain the following command bits (from left right):

  URG: Urgent Pointer field significant

 ACK: Acknowledgment field significant

 PSH: Push Function

 RST: Reset the connection

 SYN: Synchronize sequence numbers

 FIN: No more data from sender

Top 5 most read

The basic rules of safe behavior on the Internet

Manager SAM and Active Directory

You forget your password. What should I do? Part 3

Идентификаторы защиты (SID)

Social engineering as a way of committing crimes in the sphere of computer information

Copyright © 2010 BRV ISTCOM S.R.L.- раскрутка сайта