Friday, December 6, 2024
Home Tags Security

Tag: Security

TCP Flags Guide

0

LDAP Explained

0
- Advertisement -
Google search engine

RECENT

SIMILAR

DNS Sinking Explained

0
DNS Sinking (DNS Sinkholing) is a crucial cybersecurity technique used to redirect malicious or unwanted traffic to a controlled IP address, effectively neutralizing threats and preventing harm. Understanding DNS Sinking Domain Name System (DNS): DNS translates human-readable domain names into IP addresses that computers use to...

Different Types of Firewalls Explained (WAF, HBF, NBF, NGFW)

0
Web Application Firewall (WAF) It’s a Firewall that operates at the Application Layer (Layer 7 OSI) that’s designed to monitor, filter and block HTTP/HTTPS traffic to and from a Web Application. This type of firewall can be deployed in two different methods: Proxy Mode: It directly receives...

Difference between Proxy and Gateway

0
A proxy acts as an intermediary between a client and a server, it’s very often used for filtering, caching, and logging web requests. Types Forward Proxy - Used by clients to access the internet, it hides the client’s IP address. E.g. Filtering employee internet traffic. Reverse Proxy...