
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1515 Articles for Computer Network

11K+ Views
People use different languages as per the place they are living, language is used for communication purposes. Nowadays technology is improved a lot, communication became easy even though the distance between people is huge. People in one place may communicate easily with people who are in the other place using different technologies like messages, mobiles, etc… distance is not a matter for communication. It is also possible through videos, and images to the beloved people. We can express anything by communication only. With the enhancement of technology, there are more options like wired and wireless communication. Definition Communication means sending ... Read More

2K+ Views
Different languages are used by different people based on the place they are located. language is used for communication purposes. Nowadays technology is improved a lot, communication became easy even though the distance between people is huge. People in one place may communicate easily with people who are in the other place using different technologies like messages, mobiles, etc. Distance is not a matter of communication. Data Communication is transmitting data between two nodes or computers by using communication channels. The efficiency of communication completely depends on some of the basic features of the system or network. Features Delivery Sender ... Read More

2K+ Views
Data security is the procedure to secure digital information from unauthorized access, theft, or corruption. The Data security is adhere to CIA Triad functioning i.e Confidentiality, Integrity, and Availability. Confidentiality is proper authorization by the legitimate user. Integrity is robust and unchangeable to attain accurate, reliable data. Availability is access to data safely from anywhere. Data security requires some specific controls, procedures, and standard policies to avoid unethical access, loss, or destruction. Data security is important as all working with data need to take measures properly, on time and seriously to avoid data breaches which in the future can help ... Read More

413 Views
Quad9 protects users from malware, spyware, botnets, and other security threats. It enables this by providing a secure recursive public DNS resolver that users can set up in their devices, routers, and wifi endpoints as a DNS service for free. The Swiss-based not-for-profit Quad9 foundation provides the DNS service related to it. Attackers use DNS service to look into user data and use such data for commercial purposes. It also destroys such attacks by not storing or looking at the user's IP address data. This complies with General Data Protection Regulation (GDPR). It protects from malicious websites by blocking access ... Read More

553 Views
Wireless networks are getting to be an indispensable portion of our lives. They are utilized in homes, workplaces, open places, and indeed on the go. In any case, with the increment in utilization, there's also an increment in the potential for security breaches. A remote infiltration test (pentest) may be a strategy for testing the security of a remote arrange. This article will cover the nuts and bolts of remote pentest, counting its points of interest, drawbacks, importance, and requirements. What is a Wireless Pentest Basics? Wireless Pentesting (or Wireless Penetration Testing) is the process of assessing the security of ... Read More

316 Views
A technology called Wireless Fidelity (WiFi) enables wireless access to the internet and other networks. It has established itself as a standard in residences, workplaces, and public areas all across the world, offering millions of people ease and mobility. With the creation of modifications to the original WiFi standard, new features, and capabilities are continuously being added to WiFi technology. Since its beginning, WiFi innovation has experienced a few corrections, moving forward its execution and capabilities. In this article, we'll examine WiFi and its corrections. WiFi History The first release of 802.11 standards founded in 1997, marked the beginning of ... Read More

420 Views
In computer science, a wide-mouth frog alludes to a sort of security danger where a noxious performing artist picks up unauthorized get to arrange by posturing as a trusted substance. This sort of assault is additionally known as "pantomime assault." The term "wide-mouth frog" comes from the thought that the aggressor can "open its mouth wide" and pick up get touchy information. In this article, we are going investigate the effect, focal points, impediments, and requirements for security against wide-mouth frog assaults. The Wide - Mouth Frog? The "Wide-Mouth Frog" may be a term commonly utilized in computer science to ... Read More

321 Views
Cyber security means the security of cyber systems. Cyber Security secures the computer system from cyber attacks. It protects the system and the personal data, credentials, and passwords. Due to the developments in technology, the risks and the cost to retain the services are becoming higher. Over the decade cyber attacks have raised a lot and one of the most endangered attacks is the Command and Control Attack which is done using Domain Name System (DNS). It is also referred to as C&C or C2 Attack. When an Organization is under this attack, it’s very crucial to get back to ... Read More

387 Views
The criminal action or crime through the computer or computer network harms an organization like a government, a private, or even an individual. Cyber crimes can be committed by individuals or a group. A breach of confidential information, espionage, financial loss, System failure, or any other method via the internet that affects the reputation of an organization or an individual is a major risk associated with cyber crimes. Cybercrime is not accidental but intentional to harm an organization or an individual’s reputation, loss, physical or mental harm through any electronic system by concealing the identity of the cybercriminals. The growing ... Read More

2K+ Views
The criminal action or crime through the computer or computer network harms an organization like a government, a private, or even an individual. Cybercrimes can be committed by an individual or a group. A breach of confidential information, espionage, financial loss, System failure, or any other method via the internet that affects the reputation of an organization or an individual is a major risk associated with cybercrimes. Cybercrime is not accidental but intentional to harm organizations or an individuals’ reputation, loss, physical or mental harm through any electronic system by concealing the identity of the cybercriminals. The growing usage of ... Read More