Sudhir sharma has Published 1206 Articles

What is PeStudio

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 12:37:52

942 Views

PeStudio is a popular and powerful software analysis tool that allows users to analyze executable files for various Windows operating systems. The software was developed by the Belgian company, Marc Ochsenmeier, and is widely used by malware analysts, software developers, and security researchers around the world. We will provide an ... Read More

Fibre Channel Protocol

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 11:58:47

559 Views

Fibre Channel Protocol (FCP) is a communication protocol designed to provide fast and dependable data transfers between servers and storage devices in storage area networks (SANs). History of FCP FCP was first introduced in the early 1990s as a outcome of a deal between the tech giants among IBM, HP, ... Read More

Network Hubs

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 11:57:35

605 Views

A network hub is a common networking device that allows multiple devices to communicate with each other. Hubs are used in local area networks (LANs) to connect devices together, such as computers, printers, and servers. This article will explore the basics of network hubs, including how they work, the different ... Read More

Digital Audio Broadcasting (DAB)

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 11:53:53

5K+ Views

Radio broadcasting has come a long way since its inception over a century ago. From analog to digital, radio broadcasting has evolved to provide listeners with high-quality audio that can be received on a variety of devices. One of the latest advances in radio broadcasting is Digital Audio Broadcasting (DAB), ... Read More

Spread Spectrum Communications - Definition & Techniques

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 11:52:09

678 Views

Spread Spectrum Communication, a technique used to enhance the reliability and security of wireless transmissions. Spread spectrum communication involves spreading a signal over a wide range of frequencies, which makes it difficult for unauthorized users to intercept or jam the signal. This technique employs different methods to spread the signal, ... Read More

How Applications Coexist over TCP and UDP?

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 11:48:41

417 Views

When computers communicate over the internet, they follow a set of rules and protocols to ensure that data reaches its intended destination. These protocols outline how data is sent, received, and processed by computers, and are necessary for ensuring that the communication is successful. Transmission Control Protocol (TCP) is a ... Read More

2-tier and 3-tier Architecture in Networking

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 11:43:42

3K+ Views

Architecture in networking refers to the way a network is designed and organized, serving as the blueprint for the interaction and cooperation between different components and systems. Effective network architecture is crucial for a successful network setup and requires careful planning and design. When it comes to classifying network architecture, ... Read More

The Symmetric Cipher Model

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 11:40:54

2K+ Views

Encrypting sensitive information is like locking up your valuables in a strongbox, making sure that only those with the key can access it. And one tried and true method for doing so is the Symmetric Cipher Model, also known as Secret Key Cryptography. This encryption model is like having a ... Read More

How to hide an IP address

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 11:32:07

403 Views

An IP address is like a digital fingerprint, revealing your location and identity online. But just like how you can put on a disguise to hide your physical identity, you can also conceal your IP address to protect your privacy and security. Here are a few methods to do so ... Read More

Find the smallest after deleting given elements using C++

sudhir sharma

sudhir sharma

Updated on 14-Feb-2022 09:21:12

93 Views

In this problem, we are given two arrays arr[] and del[]. Our task is to find the smallest after deleting given elements.We will be deleting values from the array arr[] that are present in del[]. And then print the smallest value after deletion.Let’s take an example to understand the problem, ... Read More

Advertisements