Skip to content

Category Archives: Computer Networks

Gateways as the name suggest are one kind of gate (passage) which connect smart objects to the servers by application of fog computing.  In IoT,… Read More
This article has a Top 5 Troubleshooting questions on Operating System and Networking that will help you clear any Cloud-based Interview like AMAZON CLOUD SUPPORT… Read More
Each IP datagram contains a Source Address and a Destination Address. Based on the IP addresses in the packet header there is a task of… Read More
The Open System Interconnection (OSI) model is a standard “reference model” created by an International Organization for Standardization (ISO) to describe how software and hardware… Read More
Slammer Worm is known as sapphire, Helkern, etc. This is the fastest spreading worm in the year 2003 and some called this a ‘Worhol worm’.… Read More
Prerequisite: Keyloggers Introduction to KeyLogger It is software designed to record the keystrokes done by the user. This is one of the most basic software… Read More
IP address (Internet Protocol Address) recognizes computers on the Internet. It is a string of digits separated by some delimiter. When your device sends requests… Read More
Introductions Crypto Virus occurred from 5 September 2013 to late May 2014. This virus is also known as the crypto locker (isolated in late May… Read More
Introduction : This virus name I love you referred to as a love bug or a love letter. It infected over 10 million computers and… Read More
Email Worms is commonly known as a mass-mailing worm. This worm has the capability of sending itself as an attachment to an email or as… Read More
One of the most powerful Trojans that are popularly used by the attacker or hacker is Remote Access Trojan. This is mostly used for malicious… Read More
Password is the most common way of authentication. However, they are not as cheap and simple as we think, especially from the organization’s point of… Read More
Password Entropy is the measure of password strength or how strong the given password is. It is a measure of effectiveness of a password against… Read More
1. Control Structure :Control Structure, as name suggests, is basically a set of statements and control statements that are controlling their execution.   2. Control… Read More
1. Structured Programming :Structured Programming, as name suggests, is a technique that is considered as precursor to OOP and usually consists of well-structured and separated… Read More