sponsored by |
OSdata.com |
OSdata.com is used in more than 300 colleges and universities around the worldFind out how to get similar high web traffic and search engine placement. |
In a man-in-the-middle attack (or eavesdropping attack), the attacker intercepts network transmissions between two hosts. The attacker then masquerades as one of the hosts, often inserting additional transmissions into the network dialogue.
Encryption is the best defense against man-in-the-middle attacks.
Strong encryption authentication helps prevent man-in-the-middle attacks. For example, using ssh instead of telnet.
Session checksums and shared secrets (such as cookies) are useful defense against man-in-the-middle attacks in web interfaces.
File encryption also helps defend against man-in-the-middle attacks. Utilities such as PGP or Entrust are useful for this purpose.
OSdata.com is used in more than 300 colleges and universities around the world |
Tweets by @osdata |
A web site on dozens of operating systems simply cant be maintained by one person. This is a cooperative effort. If you spot an error in fact, grammar, syntax, or spelling, or a broken link, or have additional information, commentary, or constructive criticism, please e-mail Milo. If you have any extra copies of docs, manuals, or other materials that can assist in accuracy and completeness, please send them to Milo, PO Box 1361, Tustin, CA, USA, 92781.
Click here for our privacy policy.
previous page | next page |
This web site handcrafted on Macintosh computers using Tom Benders Tex-Edit Plus and served using FreeBSD .
Names and logos of various OSs are trademarks of their respective owners.
Copyright © 2005 Milo
Last Updated: May 8, 2005
Created: May 8, 2005
previous page | next page |