1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr1967 [171]
3 years ago
9

What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?

Computers and Technology
2 answers:
Aleksandr [31]3 years ago
7 0

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

icang [17]3 years ago
5 0

Answer:

Explanation:

This is a network protocol primarily designed for window-based system to share files with other computers on the same network. although with samba, other Operating system such ios can use SMB.

Yes, an Hacker can still damage a network using SMB by attacking the main server.

You might be interested in
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
What descriptions can be used for last,first,PR_ID and CID
faust18 [17]

Answer:

x r

Explanation:

this is the answer like it thank you

5 0
3 years ago
Define a function in Scheme (or relation in Prolog) that checks whether a set of elements (represented as a list) is a subset of
mafiozo [28]

Answer:

subset([],[]).

       subset([X|L],[X|S]) :-

           subset(L,S).

       subset(L, [_|S]) :-

           subset(L,S).

Success:

     subset([1,3], [1,2,3]).

     subset(X, [1,3,4]).        % error handling to compare sets in a given order

Fail:

     subset([2,1], [1,2,3]).   % compares in a different order from the first.

Explanation:

The function "Subset" in the source code above accepts two sets, then checks if the first set is a subset of the second. The code returns true if the condition is met.

4 0
3 years ago
What does the program 7-zip do for the files on your computer
IrinaK [193]
It condenses and expands files so they move easily over the internet.. You should never remove it.
8 0
3 years ago
What report indicates the last page users viewed before leaving a website?.
Serhud [2]

Answer:

You can find the last page users viewed before leaving the website on the “Exit Pages” report under “Site Content”

Explanation:

This can also give you a percentage of exits as well as the number of exits from a page.

If you have an important page, (using a silly example, a picture of your dog) that you really want people to see, you can check the exit pages and see how many people are actually seeing this <em>great</em> picture of your dog, or adjust your site if needed.

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly.

- Heather

3 0
2 years ago
Other questions:
  • Jessica has pinned her favorite applications as icons on her desktop. She always clicks on these icons to work on them. Which us
    10·1 answer
  • Which option allows you to add different effects for each of the bulleted items on your slide
    13·1 answer
  • You are considering creating a mobile app. Describe a basic statement for the app you would create and whether your app should b
    7·1 answer
  • What are the three types of mergers?
    8·1 answer
  • Which examples are relevant sources for students to use in research?
    6·1 answer
  • Use a for/else loop to traverse through the key names in the dictionary below in order to find Mr. Potatohead’s mailing address.
    7·1 answer
  • What command can you use if you accidentally delete a sentence in your document?
    13·2 answers
  • The following questions requires manipulation an analysis of String objects. a. Create a class named String_Manipulation with a
    6·1 answer
  • How do you unblock sites on your computer
    14·2 answers
  • what is a simulation? a) simulation is the process of creating dashboards in excel. b) simulation is the process of complex form
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!