Terms

IP spoofing

IP spoofing

(ī-pē spoof´ing) (n.) A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host.

Newer routers and firewall arrangements can offer protection against IP spoofing.

Terms

pharming

pharming

Similar in nature to email phishing, pharming seeks to obtain personal or private (usually financial related) information through domain spoofing. Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof Web sites which appear legitimate, pharming ‘poisons’ a DNS server by infusing false information into the DNS server, resulting in a user’s request being redirected elsewhere. Your browser, however will show you are at the correct Web site, which makes pharming a bit more serious and more difficult to detect.

Phishing attempts to scam people one at a time with an e-mail while pharming allows the scammers to target large groups of people at one time through domain spoofing.

See also phishing and spoofing.

Terms

ARM processors

ARM processors

ARM processors are a family of 32-bit microprocessors developed by Advanced RISC Machines, Ltd. in the 1980s. Today ARM processors power a wide variety of electronic devices, including mobile phonestablets, multimedia players and more.

ARM processors are based on a reduced instruction set computer (RISC) architecture, and while they do share the low-end market with processors from AMD and Intel, they aren’t designed to compete with these companies’ higher-end processors.

Terms

IP – Internet Protocol

IP – Internet Protocol

(pronounced as separate letters) Short for Internet Protocol. IP specifies the format of packets, also called datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.

IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but there’s no direct link between you and the recipient. TCP/IP, on the other hand, establishes a connection between two hosts so that they can send messages back and forth for a period of time.

Terms

IP address – Internet Protocol (IP) address

IP address – Internet Protocol (IP) address

IP address is short for Internet Protocol (IPaddress. An IP address is an identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. Contrast with IP, which specifies the format of packets, also called datagrams, and the addressing scheme.

IP address

Recommended Reading: Webopedia’s Internet Protocol (IP) definition.

The Format of an IP Address

The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP address.

Within an isolated network, you can assign IP addresses at random as long as each one is unique. However, connecting a private network to the Internet requires using registered IP addresses (called Internet addresses) to avoid duplicates.

Static Versus Dynamic IP Addresses

An IP address can be static or dynamic. A static IP address will never change and it is a permanent Internet address. A dynamic IP address is a temporary address that is assigned each time a computer or device accesses the Internet.

The four numbers in an IP address are used in different ways to identify a particular network and a host on that network. Four regional Internet registries — ARINRIPE NCCLACNIC and APNIC— assign Internet addresses from the following three classes:

Class A – supports 16 million hosts on each of 126 networks
Class B – supports 65,000 hosts on each of 16,000 networks
Class C – supports 254 hosts on each of 2 million networks

The number of unassigned Internet addresses is running out, so a new classless scheme called CIDR is gradually replacing the system based on classes A, B, and C and is tied to adoption of IPv6. In IPv6 the IP address size is increased from 32 bits to 128 bits.

What is My IP Address?

To view your IP address you can use the ipconfig (IPCONFIG) command line tool.  Ipconfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.

To launch the command prompt from a Windows-based computer click: Start > All Programs > Accessories > Command Prompt. Type ipconfig and press the Enter key.

You can also use Google search to find your IP address. Type “what is my IP address” as a search query and Google will show the IP address of the computer from which the query was received as the top search result.

Uncategorized

FAST TCP

FAST TCP

FAST TCP is a TCP variant and an alternative congestion control algorithm in TCP, that is designed to sustain high throughput and utilization for high-speed data transfers over large distance (e.g., tens of gigabyte files across the Atlantic).

The Fast TCP system being developed by Steven Low and colleagues at the California Institute of Technology. Current implementation is in TCP on the Linux platform, although the principles and design can be implemented in other contexts than TCP.

Uncategorized

session hijacking

session hijacking

(n.) Also referred to as TCP session hijacking, a security attack on a user session over a protected network. The most common method of session hijacking is called IP spoofing, when an attacker uses source-routed IP packets to insert commands into an active communication between two nodes on a network and disguising itself as one of the authenticated users. This type of attack is possible because authentication typically is only done at the start of a TCP session. Another type of session hijacking is known as a man-in-the-middle attack, where the attacker, using a sniffer, can observe the communication between devices and collect the data that is transmitted.

Terms

TCP/IP – Transmission Control Protocol/Internet Protocol

TCP/IP – Transmission Control Protocol/Internet Protocol

(pronounced as separate letters) TCP/IP is short for Transmission Control Protocol/Internet Protocol.

TCP/IP is the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto standard for transmitting data over networks. Even network operating systems that have their own protocols, such as Netware, also support TCP/IP.

Terms

sockstress

sockstress

Also called TCP sockstress, sockstress is a potentially serious generic issue in many operating systems that affects the availability of TCP services. It is believed that a DoS attackexploiting the sockstress vulnerability uses half-open connections to deplete resources in the machines under attack. It very quickly causes specific services to become unavailable and may even require complete machine reboots. The attack may be effective against almost anything on a network, including Windows, BSD, Linux, embedded systems TCP/IP stack implementations, and others.

May also be referred to as TCP state table manipulation vulnerability.

See also “TCP Sockstress Brings Forth New OS Exploit Worries” on ServerWatch.com.