Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles on Trending Technologies
Technical articles with clear explanations and examples
What are the types of Proxy Server?
There are various types of Proxy Server which are as follows −Forward Proxy Server − A forward proxy is a type of proxy server that generally passes requests from users in an internal network to the internet through a firewall.Forward proxies are configured to allow or deny the user's request to change through the firewall to create content on the Internet. If the proxy enable the user's request, it forwards it to the internet server through the firewall. The internet server sends its response to the proxy. The proxy sends this return back to the user.Public proxy − Public proxies ...
Read MoreWhat is a Proxy Server in information security?
A proxy server is an intermediary server that fetch data from an Internet source, including a webpage, on behalf of a user. They act as more data security boundaries securing users from malicious events on the internet.Proxy servers have some uses, and it is based on their configuration and type. Common uses contains facilitating anonymous Internet browsing, bypassing geoblocking, and regulating internet requests.Proxy servers enable users to browse the web more privately by changing your IP address and other recognizing data on the computer. Proxy servers maintain the personal data private, therefore the server does not understand who has create ...
Read MoreWhat does the pandas series.filter() method do?
The series.filter() method in the pandas series constructor is used to subset the rows of a series object based on the index labels. The filter method does not work for the content of the series object, it is only applied to the index labels of the series object.The method won’t raise an error if the specified label does not match to the series index labels.The parameters for the filter() method are items, like, regex, and axis. The items parameter takes a list-like object to access the set of rows from the given series object. The regex parameter is used to ...
Read MoreMaking a Palindrome pair in an array of words (or strings) in C++
"Madam" or "racecar" are two words that read the same backward as forwards, called palindromes.If we are given a collection or list of strings, we have to write a C++ code to find out if that can join any two strings in the list together to form a palindrome or not. If any such pair of strings exist in the given list, we have to print "Yes, " else we have to print "No."In this tutorial, input will be an array of strings, and output will be a string value accordingly, for exampleInputlist[] = {"flat", "tea", "chair", "ptalf", "tea"}OutputYesThere is ...
Read MoreWhat is DMZ in information security?
DMZ stand for the Demilitarized Zone. It defines a host or network that acts as a secure and intermediate network or path among an organization's internal network and the external, or non-propriety, network. It is called a network perimeter or perimeter network.DMZ is generally implemented to secure an inside network from interaction with and exploitation and access by outside nodes and networks. DMZ can be a logical subnetwork, or a physical network acting as a secure bridge among an inside and outside network.A DMZ network has limited access to the inside network, and some communication is scanned on a firewall ...
Read MoreHow does the pandas series.expanding() method work?
The series.expanding() method is one of the window methods of pandas and it Provides expanding transformations. And it returns a window subclassed for the particular operation.The parameters for this method are min_periods, center, axis, and method. The default value for the min_periods is 1 and it also takes an integer value. The center parameter takes a boolean value and the default one is False. In the same way, the default value for the axis parameter is 0, and for the method is ‘single’.Example 1In this following example, the series.expanding() method calculated the cumulative sum of the entire series object# importing ...
Read MoreWhat are the ways that unscrupulous people use to access or abuse unprotected computers?
There are many creative ways that unscrupulous people use to access or abuse unprotected computers which are as follows −Remote login − When someone is able to connect to the computer and control it in some form. This can range from being able to view or access the document to actually running code on the computer.Application backdoors − Some programs have unique features that enable for remote access. Others include bugs that supports a backdoor, or hidden access that supports some level of control of the program.SMTP session hijacking − SMTP is the most common approach of sending e-mail over ...
Read MoreWhat is Firewalls in information security?
A firewall can be represented as a specific type of network security device or a software program that monitors and filters incoming and outgoing network traffic based on a represented group of security rules. It facilitates as a barrier between inside private networks and outside sources (such as the public Internet).The objective of a firewall is to enable non-threatening traffic and avoid malicious or unwanted data traffic for securing the computer from viruses and attacks. A firewall is a cybersecurity tool that filters network traffic and supports users block malicious software from accessing the web in infected computers.Firewalls can be ...
Read MoreWhat is Kerberos in information security?
Kerberos is a network authentication protocol designed to support powerful authentication for client/server applications using secret-key cryptography. Kerberos provides the largest level of security to network resources.Kerberos was produced by MIT as a solution to these network security issues. The Kerberos protocol uses powerful cryptography so that a user can prove its identity to a server (and vice versa) across an insecure network connection. After a client and server has used Kerberos to determine their identity, they can also encrypt all of their communications to provide privacy and data integrity as they go about their business.Kerberos is openly accessible from ...
Read MoreHow does the pandas series.ffill() method work?
The pandas series.ffill() method works equal to the series.fillna() with “method = ffill” function or we can say that the series.ffill() is a synonym for the forward fill method.The series.ffill() method replaces the Nan or NA values in the given series object using the forward fill method. The parameters for this method are inplace, axis, limit, and downcast.It does not have parameters like value and method. Because it takes the series element as a replacement value and fills the missing values using the forward fill method.Example 1In this following example, we have applied the ffill() method to the series object ...
Read More