Dangerous IP’s – Do not scan

October 26, 2008 0 Comments 0 tags

All the below are FBI controlled Linux servers & IPs/IP-Ranges 207.60.0.0 – 207.60.255.0 The Internet Access Company207.60.2.128 – 207.60.2.255 Abacus Technology207.60.3.0 – 207.60.3.127 Mass Electric Construction Co.207.60.3.128 – 207.60.3.255 Peabody

What are the phases of malicious hacking?

October 21, 2008 0 Comments 0 tags

The following are the phases of malicious hacking: Reconnaissance: In this phase, the attacker gathers information about the victim. Scanning: In this phase, the attacker begins to probe the target

What is a stealth virus?

October 17, 2008 0 Comments 0 tags

A stealth virus is a file virus. It infects the computer and then hides itself from detection by antivirus software. It uses various mechanisms to avoid detection by antivirus software.

What is a cookie?

October 15, 2008 0 Comments 0 tags

A cookie is a small bit of text that accompanies requests and pages as they move between Web servers and browsers. It contains information that is read by a Web

What is a virus?

October 9, 2008 0 Comments 0 tags

A virus is a malicious program that passes from one computer to another in the same way as a biological virus passes from one person to another. Most viruses are

What is NetBIOS?

October 8, 2008 0 Comments 0 tags

NetBIOS is a Microsoft service that enables applications on different computers to communicate within a LAN. NetBIOS systems identify themselves with a 15-character unique name and use Server Message Block,

What is BlackIce Defender?

October 6, 2008 0 Comments 0 tags

BlackIce Defender is a Host-Based Intrusion Detection System (HIDS). It provides a firewall that detects, reports, and blocks all suspected access attempts. When any intrusion is detected, it provides a