Hi All,
This is a query related to the Subscribe and Notify signals in SIP.I know that these signals are irrespective to a call.But then there is a call-ID while decoding for this signal.
1.Can anyone tell me when this signal or message comes into the picture?
2. Importance of these two...
Hi All,
This is a query related to Active FTP and Passive FTP.I would like to know that why is it defined in the FTP connection that for the data connection in ACTIVE FTP server will initiate the session whereas for PASSIVE FTP it is the client who initiate the connection?
Secondly how is it...
Hi All,
I know this question will sound little stupid but i still want to clarify since i am getting struck in one of my design.
Kindly explain me how is the session negotiated? You can take an ex of any service : http, ftp etc.Starting from broadcast to syn, ack and everything.
2. If the...
Hi ,
I feel that it can be done if there is any kind of monitoring tool installed on a system and it monitors all the traffic of router ( TO and FRO).There are tools which taps the traffic then it can be done
Neelima
hi Schoff,
Tell me in linux for promiscuous mode all the packets having group bit is set except the broadcast packets.So can you tell how do you locate which is the group bit and which is the broadcast bit.
There is also a concept of Group Bit set packet, which are rejected by the hardware...
As mentioned in the above answer first verify that O.S snmp is installed or not and up and running or not.Then were you able to install the agent successfully if yes. and can verify with the above steps.
Hi Schofs,
Thanks for the response.But still continuing with the response i have not followed some explaination.Can you be much more clear on these explaination.
1.All an attacker needs to do is send out SYN packets and no Ack the server responds but does not log hence stealth..
What do you...
Hi ALL,
How r u? I was working on FreeBSD.I found a very strange thing in this O.S which is interesting as well as has many flaws. These is a concept of concatenating all the hard drives and making a new logical partition which has the capacity as the total summation of all the physical drives...
Hi All,
Can anyone let me know the complete process of packet capturing and decoding or analysing through the packet capturing tools? Kindly let me know the detailed information:
1. How the stealth mode works?
2. How layer wise packet decoding takes place?What all engines are there?
3. Most...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.