- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1625 Articles for Computer Network
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
1K+ Views
If you want to save money on your phone bills, setting up a VoIP phone at home is a great alternative. VoIP, or Voice over Internet Protocol, is a technology that enables phone conversations to be made over the internet. Not only is VoIP cheaper than traditional phone services, but it also delivers superior call quality and a range of innovative capabilities. We'll guide you through the steps of establishing a VoIP phone at home in this article. Step 1: Selecting a VoIP Service Provider The first step in installing a VoIP phone at home is selecting a VoIP service ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
206 Views
We all rely extensively on the internet for our daily activities in today's digital world. We all utilise numerous websites and programmes to do these duties, whether it's online shopping, social networking, or internet banking. While the internet has made our lives easier, it has also introduced new vulnerabilities like as cross-site scripting (XSS), cross-site request forgery (CSRF), and cross-site resource forgery (XSRF). These flaws may cause severe harm, ranging from data theft to website defacement, and can even endanger people's lives. In this post, we'll look at how you may limit your vulnerability to these assaults. What are XSS, ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
604 Views
Traceroute is a robust network diagnostic tool that assists you in analysing network performance and diagnosing network issues. You may map out the path that your network traffic travels from your computer to a remote server using traceroute, and find any bottlenecks or other difficulties along the way. Recognizing Traceroute Before learning how to interpret a traceroute, you should first grasp how it works. When you perform a traceroute, it transmits data packets with increasing time-to-live (TTL) values to the destination server. Each router along the way decrements the TTL value, and if it reaches zero, the router sends an ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
319 Views
Ransomware is a type of malware that has been a growing threat to individuals, organizations, and governments worldwide. Ransomware encrypts the victim's files and demands a ransom in exchange for the decryption key. The ransom can be a significant amount of money, and paying it does not guarantee the recovery of the encrypted data. In this article, we will explore how to prevent ransomware attacks and protect your data from this malicious threat. Keep Your Software Up to Date Keeping your software up to date is an essential step in preventing ransomware attacks. Software developers regularly release updates to fix ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
771 Views
As more and more services move online, the importance of access control becomes increasingly clear. Access control refers to the processes that limit the ability of unauthorized individuals or entities to access resources, whether those resources are software, data, or physical spaces. Broken access control is one of the most common vulnerabilities in software, and it's also one of the most damaging. In this article, we'll explore what broken access control is, what its consequences can be, and most importantly, how to prevent it. What is Broken Access Control? Broken access control refers to a situation in which an attacker ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
32K+ Views
On Windows 10, take these steps to alter the MAC address of a wired adapter − Step 1: Go to the Device Manager Right-click on the Start button and select Device Management from the menu that displays to enter the Device Manager. Instead, press Windows key + X and choose Device Manager from the menu. Step 2: Locate the Network Adapter Expand the Network Adapters section in the Device Manager and locate the wired adapter that you want to modify. Right-click the adapter and select Properties from the menu that appears. Step 3: Modify the MAC Address In the Properties ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
942 Views
PeStudio is a popular and powerful software analysis tool that allows users to analyze executable files for various Windows operating systems. The software was developed by the Belgian company, Marc Ochsenmeier, and is widely used by malware analysts, software developers, and security researchers around the world. We will provide an overview of what PeStudio is, how it works, features it provides to its users. The article also includes limitations and recent advancements of PeStudio. What is PeStudio? PeStudio is a tool that provides users with a detailed analysis of executable files, specifically those running on Windows operating systems. The software ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
280 Views
The PACELC theorem is a fundamental concept in distributed systems that deals with the trade-offs between consistency, availability, latency, partition tolerance, durability, and efficiency. This theorem was introduced in the early 2000s and has since become a cornerstone of modern distributed system design. In this article, we will discuss the PACELC theorem in depth, exploring each of its components and how they are related to one another. We will also talk about how the theorem affects the design and implementation of distributed systems. Consistency A distributed system's consistency guarantees that all nodes in the system have the same view of ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
906 Views
Introduction The Universal Asynchronous Receiver Transmitter (UART) protocol is a widely used communication standard in electronics and microcontroller systems. This article provides a comprehensive overview of the UART protocol, including its basic principles, data transmission mechanisms, configuration options, and common applications. What is UART? UART is a protocol that enables serial communication between two electronic devices. Microcontrollers and other embedded systems for data transmission and control use this protocol extensively. The protocol operates on a simple and efficient mechanism, where data is sent in a series of bits through a single transmission line. UART Basic Principles UART communication follows a ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
351 Views
In the world of computers and the internet, host names are a critical component of how devices connect to each other. A host name is a unique identifier that is assigned to a device or a server on a network. It is used to identify and locate devices on the internet or any other network. What is a Host Name? A host name is a label that is assigned to a device on a network. It is used to identify and locate devices on the internet or any other network. A host name is made up of a combination of ... Read More