sponsored by
OSdata.com: security 

OSdata.com

Security: man-in-the-middle attacks

Google


OSdata.com is used in more than 300 colleges and universities around the world

Find out how to get similar high web traffic and search engine placement.

man-in-the-middle attacks

    In a man-in-the-middle attack (or eavesdropping attack), the attacker intercepts network transmissions between two hosts. The attacker then masquerades as one of the hosts, often inserting additional transmissions into the network dialogue.

defense

    Encryption is the best defense against man-in-the-middle attacks.

    Strong encryption authentication helps prevent man-in-the-middle attacks. For example, using ssh instead of telnet.

    Session checksums and shared secrets (such as cookies) are useful defense against man-in-the-middle attacks in web interfaces.

    File encryption also helps defend against man-in-the-middle attacks. Utilities such as PGP or Entrust are useful for this purpose.


common attacks


geek humor


OSdata.com is used in more than 300 colleges and universities around the world

Read details here.


    A web site on dozens of operating systems simply can’t be maintained by one person. This is a cooperative effort. If you spot an error in fact, grammar, syntax, or spelling, or a broken link, or have additional information, commentary, or constructive criticism, please e-mail Milo. If you have any extra copies of docs, manuals, or other materials that can assist in accuracy and completeness, please send them to Milo, PO Box 1361, Tustin, CA, USA, 92781.

    Click here for our privacy policy.


previous page next page
previous page next page

home page

two levels up

holistic issues

one level up

peer level


Made with Macintosh

    This web site handcrafted on Macintosh computers using Tom Bender’s Tex-Edit Plus and served using FreeBSD .

Viewable With Any Browser


    Names and logos of various OSs are trademarks of their respective owners.

    Copyright © 2005 Milo

    Last Updated: May 8, 2005

    Created: May 8, 2005

previous page next page
previous page next page