Communication based vulnerabilities and script based solvabilities

World trade and related business ventures are more or less dependent on communication. Information content of communication is to be protected as miscommunication or incorrect information may ruin any business prospect. Communication using Internet or any other electronic communication is having various kinds of threat and vulnerability. Information should be packaged for communication in such a way that these vulnerabilities are reduced to a minimum. This paper focuses on the most common attacks to paralyze computer and network resources, in order to stop essential communication services. The paper provides methods, ways and means for obtaining network traces of malicious traffic and strategies for providing countermeasures. Analysis of packet captured in a network traffic is a common method of deletion of countermeasure of communication based vulnerabilities. Analysis of http based network traffic allows to intercept sensitive information such as the user's name and password. The ideal approach for secured communication is to remove all security flaws from individual hosts. A tradeoff between overheads (computational and business) and efficiency of securing mechanism of communication may be achieved by using the script based solutions. This paper presents the communication based vulnerabilities and their script based solution.