Changes

Jump to navigation Jump to search
Line 264: Line 264:  
====DNS Abuse====
 
====DNS Abuse====
 
* [[Botnet Attacks]] – infecting Internet-connected computers with malware and commanding them to perform activities under the control of a remote administrator.
 
* [[Botnet Attacks]] – infecting Internet-connected computers with malware and commanding them to perform activities under the control of a remote administrator.
* [[cache poisoning]] – causing a DNS resolver to respond with a false IP address bearing malicious code.
+
* [[Cache Poisoning]] – causing a DNS resolver to respond with a false IP address bearing malicious code.
 
* [[Cybersquatting]] – attempting to profit by purchasing domain names made of marketable and trademark-related terms and later reselling or licensing those names back to the companies that developed the trademark
 
* [[Cybersquatting]] – attempting to profit by purchasing domain names made of marketable and trademark-related terms and later reselling or licensing those names back to the companies that developed the trademark
 
* [[DDoS Attack]] – flooding a victim site with incoming traffic that originates from many different sources, making it impossible to access the site or stop the attack by blocking a single source.
 
* [[DDoS Attack]] – flooding a victim site with incoming traffic that originates from many different sources, making it impossible to access the site or stop the attack by blocking a single source.
* [[DNS hijacking]] – redirecting victims to the attacker’s site instead of the one initially requested.  
+
* [[DNS Hijacking]] – redirecting victims to the attacker’s site instead of the one initially requested.  
 
* [[Domain Kiting]] – returning a name just before the five-day period expires and re-registering it again as soon as it becomes available.
 
* [[Domain Kiting]] – returning a name just before the five-day period expires and re-registering it again as soon as it becomes available.
 
* [[Malware]] – installing malicious software, such as viruses, spyware, or ransomware, on a device without the user’s consent, to disrupt the device’s operations, gather sensitive information, or access private computer systems.
 
* [[Malware]] – installing malicious software, such as viruses, spyware, or ransomware, on a device without the user’s consent, to disrupt the device’s operations, gather sensitive information, or access private computer systems.
Bureaucrats, Check users, lookupuser, Administrators, translator
14,927

edits

Navigation menu