![Trending Articles on Technical and Non Technical topics](/images/trending_categories.jpeg)
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Satish Kumar has Published 1040 Articles
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
84 Views
Introduction PPP (Point-to-Point Protocol) is a network protocol that allows communication between two devices over a point-to-point connection. It is a widely used protocol for establishing and managing Internet connections over dial-up, DSL, and other types of connections. PPP uses a variety of commands to configure and manage communication session ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
96 Views
In today's digitally connected world, security is a critical concern for organizations of all sizes. With rise of cyber attacks, it has become imperative to implement security measures that not only provide protection but also adapt to evolving threats. One such security measure is Adaptive Security Appliance (ASA). An Adaptive ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
475 Views
In today's digital world, cyber attacks are becoming increasingly sophisticated, and organizations must continuously monitor and improve their security measures. Penetration testing, commonly known as pen testing, is a crucial step in identifying vulnerabilities and weaknesses in an organization's systems, networks, and applications. One critical area that needs to be ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
708 Views
Introduction Information security is an essential aspect of modern-day technology, and it's vital to understand various threats that can compromise sensitive data. Two of most common types of attacks that can occur are active and passive attacks. In this article, we'll explore differences between active and passive attacks, methods used ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
470 Views
Introduction Access networks are means by which internet service providers (ISPs) provide internet connectivity to their customers. They are final part of infrastructure that connects end-users to internet. Access networks can be wired or wireless and have different characteristics that make them suitable for different applications. Wired Access Networks Wired ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
236 Views
In computer networking, access control lists (ACLs) are a vital tool used to control network traffic by granting or denying access to specific resources or services. Access lists are typically used on routers, switches, and firewalls to regulate traffic flow in and out of a network. This article will explore ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
251 Views
In today's digital age, security of computer networks has become paramount. Computer networks are susceptible to a variety of security threats, ranging from unauthorized access to data breaches. To ensure security of computer networks, access control tactics play a crucial role. Access control is process of restricting access to resources ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
204 Views
Introduction In computer networking, a network switch is a device that connects network devices together to enable communication within a network. Switches are an essential component of any modern network, and they provide a way to manage network traffic by directing data to appropriate device. Access and trunk ports are ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
2K+ Views
Introduction With rapid advancement of technology and growth of internet, network security has become an increasingly important issue. Organizations and individuals alike are constantly at risk of cyber-attacks, and consequences of a successful attack can be devastating. In this article, we will discuss a model for network security that can ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
86 Views
Introduction Hashing is an essential aspect of modern cryptography. It is used to encrypt data in a secure and efficient way. Cryptographic hash functions are a type of mathematical function that takes data of any size and converts it into a fixed-size output, which is referred to as a hash. ... Read More