Man in the Middle & Redirection Attacks In the real world game of keep-away, two people toss a ball back and forth while a third person - the man in the middle - tries to intercept the ball while its enroute. In the cyberworld, the game of keep-away gets a new twist; the two players have no idea the man in the middle (MITM) exists. During the interception, the MITM may record, modify, or even redirect the communications between the two points. Here's how it works. | | Internet Explorer Security Zones The noscript addon makes Firefox safer, but its whitelist approach doesn't leave users with many options. Internet Explorer provides four separately configurable security zones: Internet, Local, Trusted, and Restricted. Proper...read more | Computer Safety Tips Achieving good computer security can seem like a daunting task. Fortunately, following these few simple steps can provide a good measure of security in very little time. >> Computer...read more | Sponsored Links | | | | Advertisement
|
No comments:
Post a Comment