=====================================================
Cache poisoning (domain name system poisoning or
DNS cache poisoning)
Margaret Rouse
WhatIs.com
Cache
poisoning, also called domain name system (DNS) poisoning or DNS cache
poisoning, is the corruption of an Internet server's domain name system table
by replacing an Internet address with that of another, rogue address.
Cache
poisoning, also called domain name system (DNS) poisoning or DNS cache
poisoning, is the corruption of an Internet server's domain name
system table by replacing an Internet address with that of another,
rogue address. When a Web user seeks the page with that address, the request is
redirected by the rogue entry in the table to a different address. At that
point, a worm,
spyware,
Web browser hijacking program, or other malware
can be downloaded to the user's computer from the rogue location.
Cache poisoning can be transmitted in a variety of ways,
increasing the rate at which rogue programs are spread. One tactic is the
placement of compromised URLs within spam e-mail messages having subject lines
that tempt users to open the message (for example, "Serious error in your
tax return"). Images and banner ads within e-mail messages can also be
vehicles by which users are directed to servers that have been compromised by
cache poisoning. Once an end user's computer has been infected with the
nefarious code, all future requests by that user's computer for the compromised
URL will be redirected to the bad IP address -- even if the "victim"
server resolves the problem at its site. Cache poisoning is particularly
dangerous when the targets are well-known and trusted sites, such as those to
which browsers are pointed when automatic virus-definition updates are
performed.
Cache poisoning differs from another form of DNS
poisoning, in which the attacker spoofs valid e-mail accounts and floods the
inboxes of administrative and technical contacts. Cache poisoning is related to
URL poisoning.
In URL poisoning, also known as location poisoning, Internet user behavior is
tracked by adding an identification (ID) number to the location line of the
browser that can be recorded as the user visits successive pages on the site.
===========================================================
In addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
If you have not already done so, please view the trailer for my book below.
===============================================
===========================================================
In addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
I am the president of Tabula Rosa Systems,
a “best of breed” reseller of products for communications, email,
network management software, security products and professional
services. Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
If you have not already done so, please view the trailer for my book below.
===============================================
No comments:
Post a Comment