10/25/09

four attack of your laptop

four attack of your laptop


ARP Attack

ARP attacks Acer Laptop Battery since 2006, it began to spread. Web intrusion protection an ARP attack is disguised as the beginning gateway IP, forwarding messages, to steal a user name and password, will not cause dropped calls. Early ARP attacks will only result in packet loss, or the Ping values increased, and will not cause serious or large-scale dropped dropped.

At this stage, control measures based on ARP ECHO orders, can be solved only for the Laptop Battery purpose of a traditional Daobao ARP attack. On the overall network will not be affected.

But in the ARP ECHO solution was raised, ARP intensified attacks on evolution occurs. The new attack, the use of higher frequency ARP ECHO, pressure over the user's broadcast ARP ECHO. As the issue of broadcast packets too many times, it will slow down the entire LAN, or occupied by the gateway computing power, occurs very slowly or go inside the network card phenomenon. If severe, frequent blink off, or the whole network dropped the Acer TravelMate 240 Battery case.

Intranet IP to deceive

Intranet IP spoofing is widespread in the ARP attack, another attack occurs followed. Disguised attack on the computer the same IP, so that computer generated by the attacks, IP conflicts, can not access. This attack phenomenon, often affects the computer is limited, not large-scale impact.

Intranet IP fraud using two-way binding, it can be effectively addressed. Prepare the acer BTP-60A1 Battery computer first, binding configuration will not be later disguise the impact of the computer. Therefore, the equivalent to a control ARP and IP intranet solution to deceive. If the ARP control using other methods, will have to use another way to deal with.

Intranet Attack

Intranet network computer attacks from the inside to issue a large number of network packets, within the bandwidth occupied. Network management will find a very slow network, Ping routing substitution, I do not know which units affected. Intranet Acer BTP-58A1 Battery attack is usually the user installed the plug-in into the computer issued by the attack. Some of its own internal network attacks will change IP, make network management more difficult to find out who sent the network packet.

We are attacking intranet solutions distinguish from the router, blocking access to the Internet computer network packet sent capacity. Therefore, users will find that if the attacker program testing, immediately dropped the case happened, this is because they are identified as issued by the router attacks on the computer, automatically cut off due. The correct testing method is to use two tests, one issue of attacks on contracted router, another to see if access to the Internet. For the internal network attacks, additional control measures is the use defense switch directly to the computer's physical abnormal-line cut, but have the ability to switch to kill the defense line and Acer TravelMate 220 Battery Inspector embarrassed thin curtain frog cried phenolic structure of good dice?

Extranet Flow Attack

External network attacks from outside attacks, usually occurs in the use of a fixed IP users. Many Internet cafes since the use of a fixed IP, fiber, they will easily become targets of attack outside the network. At the same time because the external network attacks continue to transform the regular IP, is not easy to be denial or tracing. It is to look at the phenomenon of internal network traffic is normal, but the Internet is very slow or are not able to; watch the router WAN traffic, found that the download traffic is jammed, resulting in broadband access is not smooth.

External network traffic attack, can be supplemented by on-line to determine the number, but no easy solution. In some areas may require the ISP to replace IP, but it had several days later, they again attacked. Some users with more than one dynamic IP dial-up ADSL redundancy, dynamic IP on the more difficult to become the target of attacks. Attacks are outside the network traffic offense, may notify the ISP with the law enforcement agencies to trace, but results were not looking great. At present, the external network traffic as it is the most difficult Acer BTP-43D1 Battery to deal with attacks attacks.

No comments:

Post a Comment