- Trending Categories
- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Sudhir sharma has Published 1206 Articles
sudhir sharma
627 Views
You may be interested in learning more about Wireless Application Protocol (WAP) in Global System for Mobile Communications (GSM). One of the crucial elements in understanding WAP in GSM is knowing the bearer types used in this context. A bearer type is a means of carrying data between two points. ... Read More
sudhir sharma
500 Views
The Schiper Eggli Sandoz (SES) protocol, a storied and valiant champion of networking, has a mission to find the best path for data packets to traverse through the network. With a heart of a poet, it distributes the routing information to all routers in the network, rather than entrusting the ... Read More
sudhir sharma
2K+ Views
Routing protocols are used to determine the best path for data to travel through a network. They are responsible for maintaining and updating routing tables, which are used by routers to determine the best path for data to travel through a network. There are several different types of routing protocols, ... Read More
sudhir sharma
1K+ Views
Firewalls are an integral component of every contemporary computer system, safeguarding the network and protecting the system from illegal access. We'll take a deep dive into the realm of Linux firewalls and learn how to configure one in this post. Before we involve into the technical details of establishing a ... Read More
sudhir sharma
461 Views
In today's world, the internet has become an integral part of our daily lives. With its growing popularity, it's crucial to safeguard our online activities from potential threats. One of the most effective ways to achieve this is by using a proxy server. To start, let's define what a proxy ... Read More
sudhir sharma
1K+ Views
If you want to save money on your phone bills, setting up a VoIP phone at home is a great alternative. VoIP, or Voice over Internet Protocol, is a technology that enables phone conversations to be made over the internet. Not only is VoIP cheaper than traditional phone services, but ... Read More
sudhir sharma
206 Views
We all rely extensively on the internet for our daily activities in today's digital world. We all utilise numerous websites and programmes to do these duties, whether it's online shopping, social networking, or internet banking. While the internet has made our lives easier, it has also introduced new vulnerabilities like ... Read More
sudhir sharma
604 Views
Traceroute is a robust network diagnostic tool that assists you in analysing network performance and diagnosing network issues. You may map out the path that your network traffic travels from your computer to a remote server using traceroute, and find any bottlenecks or other difficulties along the way. Recognizing Traceroute ... Read More
sudhir sharma
318 Views
Ransomware is a type of malware that has been a growing threat to individuals, organizations, and governments worldwide. Ransomware encrypts the victim's files and demands a ransom in exchange for the decryption key. The ransom can be a significant amount of money, and paying it does not guarantee the recovery ... Read More
sudhir sharma
771 Views
As more and more services move online, the importance of access control becomes increasingly clear. Access control refers to the processes that limit the ability of unauthorized individuals or entities to access resources, whether those resources are software, data, or physical spaces. Broken access control is one of the most ... Read More