Skip to content

Category Archives: Computer Networks

Overview :SSH is a security mechanism, which can be used to access the privilege and configuration mode of a Router and a Switch from a… Read More
We know a computer network is a term used to refer to any group (or system) of interconnected nodes (computers, printers, or any other devices)… Read More
Prerequisite : TCP/IP Model, User Datagram Protocol (UDP) In this era of the modern internet with entertainment, education, gaming and all kinds of necessities streaming… Read More
According to Cybersecurity Ventures, the rise in ransomware attacks is expected to cost companies $20 billion by 2021. Nowadays, ransomware attacks are on the rise,… Read More
In this article, we will discuss the overview of Data Compression and will discuss its method illustration, and also will cover the overview part entropy.… Read More
Before talking about SYN cookies and how they are used to preventing SYN Flood attack, Let us first take a look at how TCP connections… Read More
Prerequisite : OSI Layer Introduction :The Session Layer is the 5th layer in the Open System Interconnection (OSI) model. This layer allows users on different… Read More
Introduction :DNS (Domain Name System) allows you to interact with devices on the Internet without having to remember long strings of numbers. Each computer on… Read More
Infrared light for Transmission :Infrared is the frequency of light that is not visible to the eyes .The frequency of the waves lies between three… Read More
Overview :Hacking is that the activity of characteristic weaknesses throughout a knowledge processing system and a network to require advantage of the security to comprehend… Read More
Prerequisite : Internet of Things(IoT) Internet of things is playing a vital role in todays growing world. The data collected by the IoT devices provide… Read More
Blockchain technology is mostly about the transactions that we make digitally for ourselves. Eventually, these transactions make their way to the various blocks that become… Read More
Introductions :Identity Access and Management is abbreviated as IAM. In simple words, it restricts access to sensitive data while allowing employees to view, copy and… Read More
Prerequisite : OSI Model Introduction :Presentation Layer is the 6th layer in the Open System Interconnection (OSI) model. This layer is also known as Translation… Read More
Overview :Data loss protection solutions are becoming increasingly popular in today’s world. The enterprise is searching for measures to decrease the danger of sensitive data… Read More