International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 131    Submit Your Rating     Cite This   Download        Certificate

CYBER CRIME HOW AND WHY HACKERS ATTACKS SYSTEMS

    1 Author(s):  JAGMINDER

Vol -  3, Issue- 3 ,         Page(s) : 65 - 69  (2012 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Masking one's IP address is a standard practice when conducting illicit activities. A well-configured proxy provides robust anonymity and does not log activity, thereby frustrating law enforcement efforts to identify the original location of the person(s) involved. A proxy allows actors to send network traffic through another computer, which satisfies requests and returns the result. Students or employees can use proxies to communicate with blocked services such as Internet Relay Chat (IRC) and instant messaging, or to browse websites that administrators block. Attackers also use proxies because Internet Protocol (IP) addresses are traceable, and they do not want to reveal their true locations. As one example, iDefense wrote about the fast-flux architecture (ID# 484463), which uses a proxy infrastructure to satisfy requests. Proxies are also a common source of spam e-mail messages, which use open relays (a simple mail transfer protocol [SMTP] proxy). In a distributed database system, a program often referred to as the database's "back end" runs constantly on a server, interpreting data files on the server as a standard relational database. Programs on client computers allow users to manipulate that data, using tables, columns, rows, and fields. To do this, client programs send SQL statements to the server. The server then processes these statements and returns replies to the client program.

order online

  1. Varun Tiwari “CRYPTOGRAPHY IN DATABASES”,2011, www.IRJMST.com
  2. Julius Plenz, "DNStunnel.de," 2006, http://dnstunnel.de.
  3. Phrack, "Phrack Issues," n.d., http://www.phrack.com/issues.html?issue=49&id=6.
  4. Daniel Stødle, "Ping Tunnel," 2009, http://www.cs.uit.no/~daniels/PingTunnel/.
  5. Thomer Gil, "ICMPTX (IP-over-ICMP) Howto," 2009, http://thomer.com/icmptx/.
  6. Antd, "Simple ICMP Tunnel," SourceForge, 2005, http://sourceforge.net/projects/itun/.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details