Skip to content

Category Archives: Computer Networks

1. Explain the range of TCP/IP classes? 2. What are Pvt. IP address? The private IP address of a system is the IP address that… Read More
1. Name two technologies by which you would connect two offices in remote locations. Two technologies by which would connect two offices in remote locations… Read More
Filters are the validation check performed on the user’s input to ensure that the input the user has entered follows the expected input. For example,… Read More
The first plasma displays that were available were technically televisions because they did not have TV tuners. The television tuner is the device that converts… Read More
What is Latency? Being simple latency means whenever you have given input to the system and the total time period it takes to give output… Read More
In this article, let us know the major distinguishability between WAF(Web Application Firewall) and Firewall in a clean way.  Web Application Firewall(WAF) :A Web Application… Read More
Overview :It is the encrypted online content that is not indexed by conventional search engine. It is also called dark net. It is the part… Read More
What is Latency ? First let’s take an eye over latency that what exactly it is, so latency is nothing just a value in terms… Read More
Overview :Switch is a network device, which is configured to connect and maintain communication channel between various devices. Ethernet ports are present on a switch,… Read More
Prerequisite : Introduction of Firewall Introduction :A firewall proxy provides security by controlling the information going in and out of the network. Firewall proxy servers… Read More
What is hashing?Hashing is the process of converting any kind of data (usually passwords or installer files) into a fixed-length string. There are multiple types… Read More
Internet Of Robotic Things : The term “Internet of Things” (IoT) stems from the Internet Protocol suite, which is based on Transmission Control Protocol (TCP)… Read More
In this article, we will learn about DDoS mitigation and how it attacks. DDoS mitigation refers to the process of securing and protecting a server… Read More
Data Encapsulation :Encapsulation is the process of adding additional information when data is traveling in OSI or TCP/IP model. The additional information has been added… Read More
DNS Amplification Attack :In this article, we will learn about the DNS Amplification Attack and how it can be prevented. A DNS (domain name system)… Read More

Start Your Coding Journey Now!