Sponsored Content
Full Discussion: Internet Security Class
Special Forums Cybersecurity Internet Security Class Post 302255525 by metallica1973 on Thursday 6th of November 2008 03:27:16 PM
Old 11-06-2008
Internet Security Class

I will be taking a class soon on internet security and was asked the other day this question and I couldn't confidently answer the question:

A cracker who has phished information about you has discovered the ISP that you are using and your public ip address. Let say you are sending unencrypted email to an external smtp server, how would a cracker intercept the traffic and analyze it? how would that be done from the crackers computer?
 

We Also Found This Discussion For You

1. Red Hat

How do I install security patches with no internet access?

Hi, I'm pretty new to Linux and I want to download security patches and install them on RHEL 5.4. I've searched the red hat web site but cant seem to find where the download link is. (5 Replies)
Discussion started by: Jardoo
5 Replies
protocols(4)						     Kernel Interfaces Manual						      protocols(4)

NAME
protocols - Defines the Internet protocols used on the local host SYNOPSIS
/etc/protocols DESCRIPTION
The /etc/protocols file contains information about the known protocols used in the DARPA (Defense Advanced Research Projects Agency) Inter- net. Each protocol is represented by a single line in the protocols file. Each entry is of the form: Name Number Aliases The fields contain the following information: Official Internet protocol name. Protocol number. Unofficial names used for the protocol. Items on a line are separated by one or more spaces or tab characters. Comments begin with the # (number sign), and routines that search the protocols file do not interpret characters from the beginning of a comment to the end of the line. A protocol name can contain any printable character except a field delimiter, newline character, or comment character. The lines in the file appear as follows: # # Internet (IP) protocols # ip 0 IP # internet protocol, pseudo protocol number icmp 1 ICMP # internet control message protocol igmp 2 IGMP # internet group management protocol ggp 3 GGP # gateway-gateway protocol tcp 6 TCP # transmission control protocol egp 8 EGP # exterior gateway protocol pup 12 PUP # PARC universal packet protocol udp 17 UDP # user datagram protocol hmp 20 HMP # host monitoring protocol rdp 27 RDP # "reliable datagram" protocol RELATED INFORMATION
Functions: endprotoent(3), getprotobyname(3), getprotobynumber(3), getprotoent(3), setprotoent(3) delim off protocols(4)
All times are GMT -4. The time now is 09:39 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy