Select Page
Email coexistence

Email coexistence

Week 29:Email coexistence Email coexistence enables organizations with on-premises Exchange Server email environments to establish a connection between their on-premises mail environment and the Office 365 Exchange Online mail environment. With coexistence configured,...
Authentication

Authentication

Week 28:Authentication This is the process of determining whether someone or something is, in fact, who or what it is declared to be. Authentication is commonly performed through the use of user name and logon...
Gnutella

Gnutella

Week 26: Gnutella An Internet file sharing utility. Gnutella acts as a server for sharing files while simultaneously acting as a client that searches for and downloads files from other...
Zombies

Zombies

Week 25: Zombies A zombie computer (often shortened as zombie) is a computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many ina botnet, and will be used to...
Smurf

Smurf

Week 24: Smurf The Smurf attack works by spoofing the target address and sending a ping to the broadcast address for a remote network, which results in a large amount of ping replies being sent to the...