Found 1625 Articles for Computer Network

Types of Network Topology

Pranavnath
Updated on 28-Mar-2023 17:19:36

716 Views

The topology means that the elements are arranged in a particular order. They are divided into two type’s namely physical and logical topology. The nodes in the network are connected physically and the information flows through the network logically. In a computer network, the node is a point that connects data from one device to another and is used to transfer and receive information. Some of the physical nodes in the network are printers, routers, and wireless base stations and they provide an overall map of the network. There are also some logical nodes like the servers that include information ... Read More

Types of Viruses

Pranavnath
Updated on 28-Mar-2023 17:17:24

6K+ Views

The Virus is a type of code that enters the system along with any file or programs and carries out malfunctions in the system. The virus-affected program will be a replica of the existing program. They enter the system through any file and when the file runs, parallelly the virus also runs in the background. There are many ways in which the virus gets into the system. Some of them are through mail attachments, by clicking inappropriate advertisements, and by downloading any software, or files from unauthorized websites. The main objective of viruses is to spread them along different hosts. ... Read More

Types of Internet Connection

Pranavnath
Updated on 28-Mar-2023 17:15:06

3K+ Views

In this article, we will discuss the various types of internet connections. The Internet provides customers to access and transfer data between users worldwide. Internet connections vary according to the area, availability, and usage. The benefits of having Internet connections help people to access any people easily and quickly. Some of the ways to connect using the internet connection are Wifi (Wireless Fidelity), Broadband, Wired, and Digital Subscriber Lines (DSL). There are huge ways to connect our local system, mobile phones, or tabs to the internet with different Internet connection types. Types of Internet Connection There are many ways to ... Read More

Trojan horse and Trap Door

Pranavnath
Updated on 28-Mar-2023 17:12:31

2K+ Views

A threat is designed by hijackers to change the behavior of the process. The threat can reach the system through any path to our system or any organization sever. When the attack happens, it leads to the corruption of data, the stealing of personal information, and the loss of data. The Trojan horse and trap door are some of the program threats which need to be avoided for the proper functioning of the system. So it is a great deal to protect the system from program threats. The protection of files and other resources from misusing the data is important. ... Read More

Types of Cyber Attacks

Pranavnath
Updated on 28-Mar-2023 17:10:05

993 Views

In the digital world, everybody is accessible to applications, digital systems, and software. We get the details of the things we want easily on the internet today, so it is a positive change in our lives. But compared to the positive one, we should deal with the negative thing also. And the main challenge is cyber-attacks. It has been increasing every year when people try to access vulnerable sites. The main objective of cyber-attacks is data manipulation, stealing of data, and decreasing the performance of the system. There are many types of cyber-attacks and some of them are given here. ... Read More

Top 10 Common Security Log Sources

Pranavnath
Updated on 28-Mar-2023 17:07:24

812 Views

In this article, we will see the top 10 common security log sources that are being developed and used by companies. Log Sources are a type of data source that creates an event log in an organization. The log is nothing but the records with data. An event log is a tool that has software and hardware-related information. When any security threat occurs, these logs help the security specialists to use this information in the event logs for security management. Event logs are generated in a computer system that has the stuff for identifying the bugs, risks, or threats. Every ... Read More

21 Server Security Tips to Secure Your Server

Satish Kumar
Updated on 28-Mar-2023 10:17:47

272 Views

Introduction Server security is essential for any business or organization that relies on a server to store, process, and share data. A secure server ensures that sensitive information is protected from unauthorized access, theft, and cyberattacks. In this article, we will share 21 server security tips to help you secure your server and safeguard your data. Keep Your Server Software Updated One of most important server security tips is to keep your server software updated. Software updates often include security patches that address known vulnerabilities. Failure to update your software can leave your server open to attacks. Use Strong Passwords ... Read More

Books to read on networking and microcontrollers

Satish Kumar
Updated on 14-Mar-2023 16:03:55

437 Views

Networking and microcontrollers have become ubiquitous in modern world, with demand for connected devices and smart homes on rise. If you’re looking to expand your knowledge on these topics, there are a plethora of books that can help you gain a better understanding of networking and microcontrollers. In this article, we’ll explore some of best books to read on networking and microcontrollers, along with their examples and sub-headings. "TCP/IP Illustrated, Volume 1: Protocols" by W. Richard Stevens TCP/IP Illustrated is a comprehensive guide to TCP/IP protocol suite, which is foundation of internet. This book covers all aspects of TCP/IP protocol, ... Read More

Difference between WAP and the Internet

Md. Sajid
Updated on 06-Mar-2023 10:55:56

1K+ Views

The Internet and WAP (Wireless Application Protocol) are wireless communication and information access technologies. WAP is a technology created especially for movable electronics like cell phones and PDAs. It enables these devices to connect to the Internet and give information in a streamlined layout that's easy to read and use on a small screen. Wireless Markup Language (WML), as opposed to the HTML used on standard sites, is the markup language used for WAP pages, which are specifically designed for mobile devices. As we know, the internet gives access to a wide range of services and information which include sites, ... Read More

How to set up and use a proxy server?

sudhir sharma
Updated on 27-Feb-2023 12:49:46

461 Views

In today's world, the internet has become an integral part of our daily lives. With its growing popularity, it's crucial to safeguard our online activities from potential threats. One of the most effective ways to achieve this is by using a proxy server. To start, let's define what a proxy server is. It acts as an intermediary between your device and the internet. Whenever you request a webpage, the request goes through the proxy server before reaching the internet. The server then sends the webpage back to your device. This process is invisible to the user and provides various benefits. ... Read More

Advertisements