Satish Kumar has Published 1040 Articles

ADD PPP Command in PPP Configuration

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 14:51:57

84 Views

Introduction PPP (Point-to-Point Protocol) is a network protocol that allows communication between two devices over a point-to-point connection. It is a widely used protocol for establishing and managing Internet connections over dial-up, DSL, and other types of connections. PPP uses a variety of commands to configure and manage communication session ... Read More

Adaptive security appliance (ASA) features

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 14:48:07

96 Views

In today's digitally connected world, security is a critical concern for organizations of all sizes. With rise of cyber attacks, it has become imperative to implement security measures that not only provide protection but also adapt to evolving threats. One such security measure is Adaptive Security Appliance (ASA). An Adaptive ... Read More

Active Directory PenTesting

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 14:43:23

475 Views

In today's digital world, cyber attacks are becoming increasingly sophisticated, and organizations must continuously monitor and improve their security measures. Penetration testing, commonly known as pen testing, is a crucial step in identifying vulnerabilities and weaknesses in an organization's systems, networks, and applications. One critical area that needs to be ... Read More

Active and Passive attacks in Information Security

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 14:39:29

708 Views

Introduction Information security is an essential aspect of modern-day technology, and it's vital to understand various threats that can compromise sensitive data. Two of most common types of attacks that can occur are active and passive attacks. In this article, we'll explore differences between active and passive attacks, methods used ... Read More

Access Networks

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 14:34:42

470 Views

Introduction Access networks are means by which internet service providers (ISPs) provide internet connectivity to their customers. They are final part of infrastructure that connects end-users to internet. Access networks can be wired or wireless and have different characteristics that make them suitable for different applications. Wired Access Networks Wired ... Read More

Access Lists (ACL)

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 14:24:43

236 Views

In computer networking, access control lists (ACLs) are a vital tool used to control network traffic by granting or denying access to specific resources or services. Access lists are typically used on routers, switches, and firewalls to regulate traffic flow in and out of a network. This article will explore ... Read More

Access Control Tactics in Computer Networks

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 13:36:09

251 Views

In today's digital age, security of computer networks has become paramount. Computer networks are susceptible to a variety of security threats, ranging from unauthorized access to data breaches. To ensure security of computer networks, access control tactics play a crucial role. Access control is process of restricting access to resources ... Read More

Access and trunk ports

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 12:04:45

204 Views

Introduction In computer networking, a network switch is a device that connects network devices together to enable communication within a network. Switches are an essential component of any modern network, and they provide a way to manage network traffic by directing data to appropriate device. Access and trunk ports are ... Read More

A Model for Network Security

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 12:02:42

2K+ Views

Introduction With rapid advancement of technology and growth of internet, network security has become an increasingly important issue. Organizations and individuals alike are constantly at risk of cyber-attacks, and consequences of a successful attack can be devastating. In this article, we will discuss a model for network security that can ... Read More

A Cryptographic Introduction to Hashing and Hash Collisions

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 12:01:05

86 Views

Introduction Hashing is an essential aspect of modern cryptography. It is used to encrypt data in a secure and efficient way. Cryptographic hash functions are a type of mathematical function that takes data of any size and converts it into a fixed-size output, which is referred to as a hash. ... Read More

Advertisements