What is NetBIOS?

October 8, 2008 0 Comments 0 tags

NetBIOS is a Microsoft service that enables applications on different computers to communicate within a LAN. NetBIOS systems identify themselves with a 15-character unique name and use Server Message Block,

What is BlackIce Defender?

October 6, 2008 0 Comments 0 tags

BlackIce Defender is a Host-Based Intrusion Detection System (HIDS). It provides a firewall that detects, reports, and blocks all suspected access attempts. When any intrusion is detected, it provides a

What are worms?

October 5, 2008 0 Comments 0 tags

Worms are programs that replicate themselves from one system to another without using a host file. Although in most cases worms exist inside files, such as Word or Excel documents,

What are whois queries?

October 4, 2008 0 Comments 0 tags

Whois queries are used to determine the IP address ranges associated with clients. A whois query can be run on most UNIX environments. In a Windows environment, the tools such

What are the various Trojan vectors?

October 3, 2008 0 Comments 0 tags

A Trojan may infect any system through Trojan vectors. The most common Trojan vectors are as follows: * Email attachments * Social engineering * NetBIOS remote installation * Physical access

What are the various steps in the pre-attack phase?

October 2, 2008 0 Comments 0 tags

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows: 1. Information gathering 2. Determining network range 3. Identifying active machines 4. Finding

What are the various modes of system security testing?

October 1, 2008 0 Comments 0 tags

The various modes of system security testing are as follows: 1. Remote network: This mode attempts to simulate an attack launched over the Internet. The primary defenses that must be