Networks

Teardrop attack

What is a Teardrop attack?

Computing technology is an exciting world that boosts creativity in different directions. Unfortunately, malicious people are part of the environment, and they constantly innovate the methods for getting fun, popularity, or profit their way. As a result, the variety of attacks is huge already. Teardrop attack is one choice of the wide attacks’ menu.

What is a DoS attack?

Denial of Service (DoS) is an attack that aims to shut down either a machine or a network by making it inaccessible to users. There are different techniques to reach that evil objective. One is via big loads of traffic for flooding the target until it gets very sluggish and finally stops working. Another, overloading with requests and data, or the sending of malicious information, bugs for exploiting vulnerabilities or destabilizing the machine or network until it crashes. 

DoS attacks have different motivations. Sometimes they are used to sabotage businesses, ask for money for the ransom of a company, protest against a political or social measure, show power, and distract the target for doing something worse like stealing sensitive data. 

What is a Teardrop attack?

Teardrop attack belongs to the category of DoS attacks. A Teardrop attack works by sending altered packets to a target (computer, server, network). The receiver machine (target) conflicts because it can’t put together the packets in the correct sequence. Usually, a bug is used to exploit a TCP/IP vulnerability affecting its reassembly feature or TCP/IP fragmentation codes. Then, after failing continuously while trying to reconstruct the packets properly, an overlapping of them takes place, producing the target crash. 

How does Teardrop attack work?

Continue reading…

DNS tunneling attack: What do you need to know?

The topic of this article is the DNS tunneling attack. First, we will explore it in detail. Then you’ll be able to confidently assert that you know what it does and why it’s so harmful. So, without further ado, let’s get started.

DNS tunneling attack – definition

DNS Tunneling attack is cybercriminal activity. As the name implies, it is the Domain Name System attack type. Its method of operation is simple. DNS queries and responses encode the data of other programs or protocols, most often malicious. This gives attackers a covert command and control route as well as a way to steal data.

Examples and cases of DNS tunneling attack

Continue reading…

Managed DNS

Managed DNS: What is it and why to use it?

Managed DNS is a very handy tool for managing your Domain Name System. We are all conscious of the importance of DNS. There would be no Internet without it! Nonetheless, the common question is, should it go beyond the minimum? Yes, if you want to improve the resolution of your domain, it is advisable to implement a Managed DNS service. But why this is necessary, we will see today in our article. 

What does Managed DNS mean?

Managed DNS is a very convenient service that allows you to manage your DNS data. It is mostly offered by specialized firms, also known as hosting companies. When you choose a provider and, therefore, the right plan for you, you will access their servers. In fact, thanks to them, you will be able to manage your data, namely to implement Managed DNS.

Continue reading…

PaaS

What is PaaS used for?

What is PaaS?

Platform-as-a-service, also commonly called PaaS, is a type of cloud computing. It is one level above reacher in functionality rather than the IaaS (infrastructure-as-a-service). It provides a great opportunity for clients. They receive an entire platform for running and developing applications. Additionally, they don’t have to take any care of the developing conditions or the whole infrastructure.

Continue reading…

FTP (File Transfer Protocol)

​What is FTP (File Transfer Protocol)?

​FTP (File Transfer Protocol) definition

FTP (File Transfer Protocol) is a communication protocol designed for file transfer between a client and a server. FTP is a standard Internet protocol and uses TCP/IP for transferring the file from one device to another. It was created in 1971 (RFC 114) by Abhay Bhushan. Later it was updated in 1980, adding the TCP/IP compatibility. Finally, and some years later, in 1985, we got to the current version.

With the time IPv6 support was added, and so was added security extension for FTP. 

FTP was used straight off the Command Prompt or Terminal in the past since there was no graphic user interface (GUI). Now, there are FTP server applications and FTP client applications, both for computers and mobile devices, that provide a GUI.

Discover the main differences between FTP and HTTP!

Continue reading…

TTL

TTL meaning and definition

Time is a critical factor to be considered almost for everything. Every project, business, process, fixing, etc., you try is marked by a specific time. Computing and networking are not exceptions. Lots of processes must happen in determined periods of time, actually in milliseconds, to be considered efficient and successful. 

TTL meaning and definition

The letters TTL are the initials for time-to-live. It is the value that points to the exact period of time or number of hops that data packet is configured to be alive on a network or in the cache memory. Once that time expires, or it hops the number of times, routers will discard it. There are different kinds of data-chunks, and they all work with their specific TTL. Meaning, the time such data will be held in a device to complete determined tasks or functions.  

Continue reading…

IPAM IP Address Management

What is IPAM (IP Address Management)?

Do you remember when the Internet meant a connection to a desktop computer? Later laptops came to your business, followed by tablets, printers, and all your colleagues’ smartphones, etc. Have you considered how many devices are looking for Internet connection in your business facilities right now?

And this happens daily all around the world. The number of devices grows in such a way that managing networks are getting very complex. Just IP addresses’ assignation or tracking can take a lot of time. And network administrators have so many more tasks to comply with.

To do this manually is not really a choice. In such a scenario, IP address management (IPAM) is very convenient for you.

IPAM Integration with DNS and DHCP

Continue reading…

UDP User Datagram Protocol

What is UDP?

UDP stands for User Datagram Protocol, and it is an efficient and fast communicating protocol to exchange messages between networks and devices. 

It’s very used on the Internet for tasks sensitive to time, like video transmissions, real-time systems, and DNS lookups. 

This protocol is a David P. Reed creation (1980). An American computer scientist whose contributions helped wireless communications networks and computer networking development. UDP has become fast an important Internet protocol suite’s element.

Learn what UDP header is!

Continue reading…