Knowledge base

A
B
C
D
F
H
I
L
M
N
P
R
S
T
U
V
W
Z
Shared Web Hosting
Shared hosting is a type of web hosting where multiple websites are hosted on a single physical server.
Cloud Hosting

Cloud hosting is a model of web hosting services in which data and applications are stored and processed on remote servers that are accessed via the internet.

P2P network

P2P is an efficient method of transferring data over the Internet. The best-known example of a P2P network is torrent.

Firewall

A firewall is a type of system used to monitor connections between computer networks. As one of the first responses to malicious activity carried out over the Internet, firewalls have become a standard part of corporate, government, and private networks.firewall

IP address

IP address is the identifier of the device connected to the network.

IP address
Proxy server

A proxy server is a system that routes traffic between networks or protocols. The proxy server has its own IP address, so it acts as an intermediary between your computer and the Internet.

proxy-server.png
DNSBL (DNS Blacklists)

Domain Name System blacklists, also known as DNSBL or DNS blacklists, are spam blocking lists that allow the website administrator to block messages from certain systems.

TCP handshake

To establish a reliable connection, TCP uses a process called the “three-way handshake”. The established connection will be full-duplex, that is, both channels can transmit information simultaneously, and they also synchronize (SYN) and acknowledge (ACK) with each other.

What is TLS fingerprinting?

TLS fingerprintimg helps to effectively detect a wide range of unwanted traffic, while not paying attention to connections with already familiar fingerprints.

Attacks against websites

Malicious actions impacting web resources on the Internet. Attacks of this kind are usually classified into mass and targeted types. Attacks of the first type target a site as a whole and are usually automated. In mass attacks, attackers use their knowledge of popular tools and widespread vulnerabilities. Targeted attacks, on the other hand, are usually carried out by manually searching for vulnerabilities and exploiting them. The damage inflicted by an attack of this type can be fatal.

UDP Flood

UDP flood is a network-based DoS attack carried out by sending large amounts of UDP packets to a remote host’s ports.

What is IP tunneling?

Creating a virtual channel for data exchange between two Internet-connected networks by way of encapsulating traffic inside the IP protocol.

Teardrop Attack

A DDoS attack carried out using fragmented packets with an offset, based on exploiting a TCP/IP stack vulnerability.

Shown 1-13 out of 77
We use cookies to make the site faster and more user-friendly. By continuing to use the site you agree to our Privacy Policy