Coining a new terminology in the technical field requires a strong impulse. The concept of DTN arrived primarily to combat the disruption which occurs in conventional TCP/IP (Transmission Control Protocol). Our communication network has many mediums that a data packet can take, like: wire, wireless, optical etc. These medium are subjective to various damages such as wire cut, power failure of a node and other human generated errors. As a consequence, the sender of data from one end of communication channel could not send the data. DTN, to some extent, eradicates this problem. How TCP works? TCP is the most widely used protocol in the history of computers, that's for sure. Lets just have a look on its basics in the figure below. The main concept here is to confirm that a communication channel exists from sender to the receiver. That is exactly how TCP functions. The sender first sends a packet having SYN flag value high(1). The SYN high flag means a node wants to start a dat
Foot-printing is an art of gathering minute details of the target like IP, OS, Software installed, Security Systems, Location, Owners, Emails, Personal data etc. A hacker gathers all the details needed to break into the system. There are numerous ways to do this and also various tools and tricks available for this. Lets discuss some of them so that we can have some idea of what foot-printing is. Foot-printing can be categorized into two types on the basis of access mode. a) Active Mode b) Passive Mode a) In Active Mode , the attacker makes actual contact with the target system. The active method includes process such as email tracking, website mirror, server confirmation. Email Track : Examine email path from where is email coming, the IP, the path it took. Tools like Email Tracker Pro (Link at bottom) provide such details. these details are used to trace the fake mail's source IP's, location and path. For this tracking, the email he