Ping Sweeps

Ping Sweeps
The boom of the cutting-edge technological equipment and gadgets has ushered in a simplified technological lifestyle. However, as the adage goes that you never know what lies behind a sparkling facade, there has been the negative sides of the technology too. Some unscrupulous people who use technology have other ideas in their minds: using the technological gadgets and equipment as crude forms of ‘poaching’ information and other types of data from companies and firms their own benefits.
Among the methods used, there are two ways namely: ping sweeps and port scans.
Ping sweeps: this method is sometimes refereed to as Internet Control Message Protocol or truncated as ICMP .According to expatriates, a single ping can determine one type of host that’s on the computer. This is a process that entails the use of a method that scrutinizes and settles on the type of range of IP address plan to computers and equipment. Reverberation is fed to many hosts prior to which if they emit a reverberation of the ICMP, the user knows that there is a kind of existing address. The ping sweep comes in various varieties name that are used in types of systems (like UNIX system) and in the form of software. That are used for the systems are: nmap, gping and fping.On the other side, the one used as software are: ping sweeps and rhino9 both of which are used in the windows systems. The network programmers can counter-measure and hinder the ping sweeps used by the ‘poachers’ by obstructing the reverberations of the ICMP that penetrate through from alien sources. The disadvantage of the problem is that its nit only outdate, but also very slow.(Chris,2007)

Port scans: this is signals sent by an individual who is trying to hack into a computer networking where each port scan is related with a familiar port number. This method of port scanning, is like the boxing ring where a boxer punches half to full nelsons (punches to his opponent).The scans guide him where its easily to crack the codes. The scans are sent to all the ports, one after another until the aim is achieved. The types of scans vary: from strobes, connecting to only earmarked ports. Stealth scans that keep the way clear as they avert the link requests from, being closed. Sweep-scans involve scanning a relegated port among chosen computers. Vanilla tries to link to all the ports. File Transfer Protocol Bounce scans are aimed at the desired spot under the camouflage of the F.T.P server. The last is U.D.P scans that are aimed at unclosed datagram protocol. (Baskin 2008)
Is there need to worry? there is not the need to tense since you can opt for self-destructing emails that either destroy themselves automatically or are given the day due expiry. Secondly there is the memory sharing in computer; this is the method by which the networking processes swap over data swiftly that when it would have been read. Stockkeeping unit; which are the goods that can be followed for inventory decisions. Among others are: permittivity, software developer’s kit, angular velocity and cardinality.
There are two types of information ‘poaching’ namely: ping sweeps (uses nmap, gping, fping and rhino9).Port scans (uses strobes, stealth, sweep, and vanilla, F.T.P., and U.D.P scans.)
The two processes pose no immediate threats as: the ping sweeps is outdated and very slow, while the port scan is counter-measured by: using self-destructive emails, memory sharing, stock keeping unit, permittivity, angular velocity, software developer’s kit and cardinality.
Baskin Brian, K. (2008). Netcat Power Tools. Berlimgton: Syngress.
Chris, H. (2007). Penetration Testers Open Source Toolkit. Burlington: Syngress.

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:

Last Completed Projects

# topic title discipline academic level pages delivered
Writer's choice
1 hour 32 min
Wise Approach to
2 hours 19 min
1980's and 1990
2 hours 20 min
pick the best topic
2 hours 27 min
finance for leisure
2 hours 36 min