The Security Guide Security Guide RSS Feed


Internet and Data Security Knowledgebase

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 


Fast Flux attacks Fast Flux is a technique used by malware authors to mess with DNS in a way that makes it very hard to track them. It involves using a very long list of compromised IP addresses.
Worms and viruses will communicate with an ever changing source address, which then defeats any type of IP blocks or firewalling that a network administrator could do.
The main way to detect and defeat those techniques is for DNS admins to be vigilant and check suspicious entries in the server.
File encryption Protects specific data where needed.
File sharing Making files available over the internet to other users, typically music or video files.
Filter A program designed to monitor what is being loaded into a web browser or email program and block certain types of material.
Firewall A firewall blocks any unauthorized ports on your computer, thus restricting unfettered access.
Forest A forest is a collection of one or more Active Directory domains that share a common logical structure, global catalog, directory schema, and directory configuration.
A forest defines a security boundary.
Format string vulnerabilities Format string attacks can be used to crash a program or to execute harmful code. The problem stems from the use of unfiltered user input as the format string parameter in certain C functions that perform formatting.
Freeloading Where a wireless network is used to share a broadband internet connection, there is a risk that unauthorised users will use the connection.
Full disk encryption A method to protect everything on a disk drive (all data including the operating system).

© RuleWorks - All Rights Reserved - Policy -