Skip to content

Category Archives: Computer Networks

Before talking about SYN cookies and how they are used to preventing SYN Flood attack, Let us first take a look at how TCP connections… Read More
Prerequisite : OSI Layer Introduction :The Session Layer is the 5th layer in the Open System Interconnection (OSI) model. This layer allows users on different… Read More
Introduction :DNS (Domain Name System) allows you to interact with devices on the Internet without having to remember long strings of numbers. Each computer on… Read More
Infrared light for Transmission :Infrared is the frequency of light that is not visible to the eyes .The frequency of the waves lies between three… Read More
Overview :Hacking is that the activity of characteristic weaknesses throughout a knowledge processing system and a network to require advantage of the security to comprehend… Read More
Prerequisite : Internet of Things(IoT) Internet of things is playing a vital role in todays growing world. The data collected by the IoT devices provide… Read More
Blockchain technology is mostly about the transactions that we make digitally for ourselves. Eventually, these transactions make their way to the various blocks that become… Read More
Prerequisite : OSI Model Introduction :Presentation Layer is the 6th layer in the Open System Interconnection (OSI) model. This layer is also known as Translation… Read More
Introductions :Identity Access and Management is abbreviated as IAM. In simple words, it restricts access to sensitive data while allowing employees to view, copy and… Read More
Overview :Data loss protection solutions are becoming increasingly popular in today’s world. The enterprise is searching for measures to decrease the danger of sensitive data… Read More
In this article, we are going to discuss the overview of Ethereum Network and will discuss the benefits, and finally conclude with components of the… Read More
In this article, we will discuss the overview of the Open Vulnerability Assessment System (Open VAS) and will also cover its working, and its features,… Read More
Overview :In popular media, the term “hacker” refers to someone who uses bugs and exploits to get into someone else’s security, or who uses his… Read More
In this article, we will discuss the overview of URL and Browser with examples of both of them. And finally will conclude with the Maximum… Read More
In this article, we will discuss the overview of the Docking Station and will discuss its uses, features, working, and finally conclude with its types.… Read More