Skip to content

Category Archives: Computer Networks

Introductions Crypto Virus occurred from 5 September 2013 to late May 2014. This virus is also known as the crypto locker (isolated in late May… Read More
Introduction : This virus name I love you referred to as a love bug or a love letter. It infected over 10 million computers and… Read More
Email Worms is commonly known as a mass-mailing worm. This worm has the capability of sending itself as an attachment to an email or as… Read More
One of the most powerful Trojans that are popularly used by the attacker or hacker is Remote Access Trojan. This is mostly used for malicious… Read More
Password is the most common way of authentication. However, they are not as cheap and simple as we think, especially from the organization’s point of… Read More
Password Entropy is the measure of password strength or how strong the given password is. It is a measure of effectiveness of a password against… Read More
1. Control Structure :Control Structure, as name suggests, is basically a set of statements and control statements that are controlling their execution.   2. Control… Read More
1. Structured Programming :Structured Programming, as name suggests, is a technique that is considered as precursor to OOP and usually consists of well-structured and separated… Read More
The name of the Trojan Horse is taken from a classical story of the Trojan War.  It is a code that is malicious in nature… Read More
In this, we will discuss the basic overview of networking and will cover common terminologies of networking. You will be able to understand the concept… Read More
DNS stands for Domain Name System. It is a translation service that converts a domain name to Ip address. DNS server is an implementation of… Read More
Simplified Data Encryption Standard (S-DES) is a simple version of the DES Algorithm. It is similar to the DES algorithm but is a smaller algorithm… Read More
RC4 is a symmetric stream cipher and variable key length algorithm. This symmetric key algorithm is used identically for encryption and decryption such that the… Read More
1. Dense wavelength division multiplexers (DWDM) :DWDM refers to Dense wavelength division multiplexers. It is the modules that put data from different sources together on… Read More
1. Synchronous TDM :Synchronous time division multiplexing (STDM), every device which is present in this has given the same time slot to transmit data. This… Read More

Start Your Coding Journey Now!