Skip to content

Category Archives: Computer Networks

What is hashing?Hashing is the process of converting any kind of data (usually passwords or installer files) into a fixed-length string. There are multiple types… Read More
Internet Of Robotic Things : The term “Internet of Things” (IoT) stems from the Internet Protocol suite, which is based on Transmission Control Protocol (TCP)… Read More
In this article, we will learn about DDoS mitigation and how it attacks. DDoS mitigation refers to the process of securing and protecting a server… Read More
Data Encapsulation :Encapsulation is the process of adding additional information when data is traveling in OSI or TCP/IP model. The additional information has been added… Read More
DNS Amplification Attack :In this article, we will learn about the DNS Amplification Attack and how it can be prevented. A DNS (domain name system)… Read More
DDoS Attack  :Distributed Denial of Service Attack is a sophisticated cyber attack, which is performed on digital assets, such as servers and computer systems. Primary… Read More
What Is Network?Let’s start by defining a network. A network is simply a collection or system of people or objects that are linked together. A… Read More
Wireless Pen-testing :Many of them want to use wi-fi , most of them try to hack the wi-fi and get the password without acknowledgement of… Read More
Prerequisite : Introduction of MAC Address In this article we will learn How to Find Our  Mac Address. 1. Finding mac address in Windows :… Read More
Overview :A simple definition of Computer Network is an interconnection of two or more computers(includes personal computers, mobiles, laptops, etc, network devices like a router,… Read More
In this article, we will discuss the overview of DHCP and will focus to implement How to Configure DHCP Server on a Cisco Router step… Read More
Message and Message Digest The document is called a message. Fingerprints are called a message digest. To preserve integrity hash function is applied to the… Read More
In this article, we will discuss about a broadcast storm and its effects and how we can eliminate them. A Broadcast Storm is basically a… Read More
Today we will see the Real-Life Examples of TCP and UDP in Computer Networks Before looking at the Real-Life Examples of TCP and UDP, Let’s… Read More
Overview :The traditional firewall provides a clear overview of network traffic jams. Allows or restricts traffic according to state, port, and protocol, and filters traffic… Read More

Start Your Coding Journey Now!