What is MAC Flooding? How to prevent it?

By | 2018-06-03T10:34:22+00:00 October 28th, 2016|

MAC Flooding MAC Flooding is one of the most common network attacks. Unlike other web attacks,  MAC Flooding is not a method of attacking any host machine in the network, but it is the method of attacking the network switches. However, the victim of the attack is a host computer in the network. We are [...]

What is IP Spoofing? Types of IP Spoofing

By | 2018-06-09T13:36:16+00:00 October 14th, 2016|

What is IP Spoofing Before discussing about IP spoofing, let's see take a look at IP addresses. An IP address is a unique set of numbers which separated with the full stops which is used to identify each computer using the Internet Protocol to communicate over a network. IP spoofing can be defined as an [...]