• Home » kb
  • Email Greylisting. How does greylisting work?

    Posted at November 29, 2016 at 1:50 pm by Jithin

    Spamming is a major concern for all Internet users. Greylisting and tarpitting are two methods to discourage or stop email spamming. We are going to see these methods in detail in this article.   What is Spam A spam email is the one you've received in your inbox when it has not specifically been asked for. It can be commercial advertising messages too. These emails are also known as junk emails or unsolicited bulk emails (UBC). These messages are sent in bulk. They will be nearly i   [...]

    Read More

    What is IP Spoofing? Types of IP Spoofing

    Posted at October 14, 2016 at 4:02 pm by Jithin

    What is IP Spoofing Before discussing about IP spoofing, let's see take a look at IP addresses. An IP address is a unique set of numbers which separated with the full stops which is used to identify each computer using the Internet Protocol to communicate over a network. IP spoofing can be defined as an attacking technique where, the hacker pretends to be someone else is not as a trusted host and conceal his identity to gain access to a network and hijack the browsers. IP spoofing is also cal   [...]

    Read More

    What is SYN Flood attack and how to prevent it?

    Posted at October 14, 2016 at 4:00 pm by Jithin

    A SYN flood is a form of denial-of-service attack in which an attacker sends a progression of SYN requests to an objective's framework trying to consume enough server assets to make the framework inert to authentic activity.   TCP three-way handshake Typically, when a customer begins a TCP connection with a server, the customer and server trade a progression of messages which regularly runs this way: 1) The customer asks for a connection by sending a SYN (synchronize) message to   [...]

    Read More

    What is DHCP?

    Posted at October 14, 2016 at 3:59 pm by Jithin

    DHCP (Dynamic Host Configuration Protocol) is a standardized network protocol. It is used in Internet Protocol networks for dynamic distribution of network configuration parameters, such as IP addresses for interfaces and services. A DHCP server can run on an operating system such as Linux or Windows and is used to distribute IP addresses automatically to the clients in the network. Since, DHCP server assigns IP addresses automatically to all systems, a system or network administrator does not n   [...]

    Read More

    How to Use IP Command in Linux

    Posted at September 22, 2016 at 5:50 pm by Jithin

    IP command is a command with more features that ifconfig. The command helps to do various tasks related to network administration. Today, ifconfig command is the least used command.   Setting and Deleting an IP Address $ sudo ip addr add IPaddress/24 dev eth0 In this the IP address includes a prefix. This is used to show the subnet mask used. (Replace IP address with exact IP address) To verify the changes, show command can be useful. $ ip addr show wlan0 The same steps can    [...]

    Read More

    Types, Features and Classes of IP Address

    Posted at September 8, 2016 at 6:34 pm by Jithin

    The IP address is a familiar term for most computer users. An IP address is the unique numerical address of a device in a computer network that uses Internet Protocol for communication. The IP address allow you to pinpoint a particular device from the billions of devices on the Internet. To send you a letter, someone needs your mailing address. In the same sense, one computer needs the IP address of another computer to communicate with it. An IP address consists of four numbers; each can cont   [...]

    Read More