Results 1 to 4 of 4

Thread: Need information on DMZ

  1. #1
    Join Date
    Nov 2009
    Posts
    721

    Need information on DMZ

    Hi,
    I was reading a article on internet which states information on network and internet security. This articles describes about multiple terms of Network security. I am looking for a complete description on DMZ. What is it means and what it stands for. Second thing what is social engineering. For what purpose this practice is carried out. And the last thing I want to know what is a ZOMBIE on internet. Thanks in advance.

  2. #2
    Join Date
    Apr 2008
    Posts
    3,339

    Re: Need information on DMZ

    A DMZ, or demilitarized zone, is a sub-network isolated from the rest of the network by a firewall. This area is located between a private internal network (Local Area Network, LAN) and another network, generally public, such as the Internet. A DMZ is designed for installing servers that expose services to the local network, but also to the Internet is typically the case of Web servers and messaging. The purpose of the DMZ is to use the same servers internally and externally, without compromising the security of confidential data and applications of an enterprise.

  3. #3
    Join Date
    Jan 2006
    Posts
    4,221

    Re: Need information on DMZ

    Social engineering refers to attack a computer system by the link most likely to commit a miscalculation: the human. When the attacker is knowledgeable about the structure of the body it is, it's easy to pretend to be one or two players of executives / managers and any pretext of emergency / constraints of society very serious , requesting sensitive information on computer system. The caller may be deceived by the hacker's knowledge of the organization of society and release of strategic information.

  4. #4
    Join Date
    Jan 2006
    Posts
    3,792

    Re: Need information on DMZ

    A zombie is a PC probably poorly protected and which has been infected by a virus or worm. This program allows a malicious hacker to take remote control of the PC and use it to send mail, attack other machines, etc.. An attacker can trigger a DOS attack if it has control of a large number of zombie machines. And in social engineering is imperative to control who has access to what information and under what conditions and that they can be transmitted. It is also important to ensure that each caller to whom he is dealing.

Similar Threads

  1. Want information about MBA in Information Technology
    By Shantanu12 in forum Education Career and Job Discussions
    Replies: 12
    Last Post: 04-05-2012, 12:30 PM
  2. Replies: 5
    Last Post: 08-04-2011, 10:36 AM
  3. System Information - "Can't Collect Information"
    By microsvc in forum Vista Help
    Replies: 9
    Last Post: 13-05-2010, 03:07 PM
  4. Need some information on XML
    By Elbanco in forum Software Development
    Replies: 3
    Last Post: 21-11-2009, 03:56 AM
  5. Need information on USB 3.0
    By Zipp in forum Hardware Peripherals
    Replies: 3
    Last Post: 08-07-2009, 08:23 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,750,508,455.12283 seconds with 16 queries