Answered You can hire a professional tutor to get the answer.
Complete 6 pages APA formatted article: Computer Crime File Content Analysis. However, they can go on to use Ping to convert the IP address into a domain name. the DNS will then reveal the matching do
Complete 6 pages APA formatted article: Computer Crime File Content Analysis. However, they can go on to use Ping to convert the IP address into a domain name. the DNS will then reveal the matching domain name.
Ping is usually the initial step that the bad guys use to propagate their crimes. Since Ping uses ICMP to determine whether the destination is reachable, it will send echo packets to the destination hence the target will reply back with ICMP.
The good guys use ns lookup to find IP addresses that coincide with certain World Wide Web addresses. This takes the form of ns lookup x.x.x.x where x.x.x.x is the World wide web address the user wishes to locate. This will bring the IP address of the server that hosts the website they are interested in.
The bad guys can use whois utility to expose the registration information of internet users who had opted for privacy. This can be done without the user’s permission. To make it worse the information will be available on a permanent basis because internet services keep whois archived. The good guys on the other hand use the whois utility to compile the data of users into whois databases so that then data can be safely stored. The stored data will then act as the internet phonebook so that people can research them on the internet.
By performing a whois lookup through the wide variety of whois tools available over the internet they can gain a lot of information that gives them the edge over the good guys. For example, through whois lookup, the bad guys can have access to internet domain name registration information that includes contract names because the DNS servers are the ones that hold this information.
PDF trailers are used to show the location of the cross-reference table together with the special objects within the document. It consists of three parts. The first part is the word ‘trailer’ and is preceded by a dictionary that is comprised of values for the fields.