DNS$94502$ - translation to γερμανικά
Diclib.com
Διαδικτυακό λεξικό

DNS$94502$ - translation to γερμανικά

CYBERATTACK IN WHICH CORRUPT DNS DATA IS INTRODUCED INTO THE DNS RESOLVER'S CACHE, CAUSING THE NAME SERVER TO RETURN AN INCORRECT RESULT RECORD, E.G. AN IP ADDRESS, DIVERTING TRAFFIC TO THE ATTACKER
Dns cache poisoning; DNS poisoning; Dns poisoning; DNS Spoofing; DNS cache poisoning; DNS cache pollution

DNS      
Domänennamendienst, Dienst im Internet der Webseitennamen in ihre numerische Adresse umwandelt
Round Robin DNS         
LOAD BALANCING TECHNIQUE IN THE INTERNET'S DOMAIN NAME SYSTEM (DNS)
Round robin dns; Round Robin DNS; Round robin DNS; DNS round robin
Round Robin-Datenverteilung, Rechnerzuordnungen für Indexpartitionen durch Datenverteilung (Internet)
Domain Name Service         
  • DNS resolution sequence
  • A DNS resolver that implements the iterative approach mandated by RFC 1034; in this case, the resolver consults three name servers to resolve the [[fully qualified domain name]] "www.wikipedia.org".
SYSTEM TO IDENTIFY RESOURCES ON A NETWORK
Domain name service; Dns; Domain Name Services; D.N.S.; Domain Name Service; Glue record; Domain namespace; Resolver (DNS); Port 53; DNS System; DNS Protocol; Authoritative answer; Glue records; DNS Resolvers; DNS resolver; Address resolution mechanism; DNS record; DNS label; Lame delegation; Resource record; DNS resolvers; DNS name; Domain propagation; Domain Propagation; DNS error; DNS propagation; RRset; DNS (computing); Domain name services; Domain name system; Domain Name System (DNS); DNS; Recursive DNS resolver; DNS query; DNS records; Domain Naming System; Doq; DNS over QUIC; DNS-over-QUIC
Domänennamendienst, Dienst im Internet der Webseitennamen in ihre numerische Adresse umwandelt

Ορισμός

DNS
1. Domain Name System. 2. Distributed Name Service. See DECdns.

Βικιπαίδεια

DNS spoofing

DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver's cache, causing the name server to return an incorrect result record, e.g. an IP address. This results in traffic being diverted to any computer that the attacker chooses.