Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Computer Network Articles
Page 38 of 122
Difference between Spooling and Buffering
Multitasking plays an important role in defining computer performance by determining how the CPU divides and manages processes between different input/output subsystems. To process multiple tasks efficiently, computer systems use various methods including spooling and buffering, which are fundamental techniques for optimizing data flow and system performance. In this article, we will discuss the major differences between spooling and buffering. Let's first understand each concept individually to better grasp how they differ from each other. What is Spooling? Spooling (Simultaneous Peripheral Operation On-Line) is a technique that stores data in a temporary working area where it can ...
Read MoreDifference between SSH and Telnet.
There are various application programs that we can use to access the resources of a remote machine. Telnet and SSH are the primary client-server application programs that use remote terminal service, which allows a user at one site to interact with a remote timesharing system at another site as if the user's keyboard and display are connected directly to the remote machine. Both Telnet and SSH are Layer 7 application layer protocols and both use TCP (Transmission Control Protocol) at the transport layer. In this article, we will discuss the important differences between SSH and Telnet. But before going ...
Read MoreDifference Between Virtual Private Network (VPN) and Proxy
Both VPN and Proxy are network technologies used to access remote systems and route internet traffic, but they serve different purposes and offer varying levels of security. VPNs provide superior privacy and security by creating encrypted tunnels for all network traffic, while proxies simply act as intermediaries for specific applications without inherent security features. Understanding the differences between these technologies helps in choosing the right solution for your networking needs, whether for privacy, security, or simple content access. What is a Virtual Private Network (VPN)? A Virtual Private Network (VPN) creates a secure, encrypted connection between a ...
Read MoreMost Frequently Used Linux IPTables Rules with Examples
This article provides a comprehensive collection of IPTables rules that you can use directly for common networking and security tasks. These examples serve as practical templates for configuring IPTables firewall rules to suit your specific requirements. Deleting IPTables or Existing Rules Before building new IPTables rules, clean up all default and existing rules using the flush command: # iptables --flush # iptables -F Setting Default Chain Policies Change the default policy from ACCEPT to DROP for enhanced security: # iptables -P INPUT DROP # iptables -P FORWARD DROP # iptables -P ...
Read More10 Netstat Command Examples on Linux
The netstat command is a powerful network utility that displays network connections, routing tables, interface statistics, masquerade connections, and multicast memberships on Linux systems. This command is essential for network troubleshooting and monitoring active connections on your system. Display All Connections To show all listening and non-listening sockets, use the -a option: netstat -a This displays both active connections and listening ports: Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address ...
Read MoreHow to install Angry IP Scanner from PPA in Ubuntu/Linux Mint
Angry IP Scanner is an open-source and cross-platform network scanner designed for fast and simple IP address and port scanning. This lightweight tool allows users to scan IP addresses within any specified range through an intuitive graphical interface. When Angry IP Scanner detects an active IP address, it resolves the MAC address, hostname, and available ports. The collected data can be exported in multiple formats including TXT, CSV, XML, or IP-Port list files. Prerequisites Before installing Angry IP Scanner, ensure your system is running Ubuntu or Linux Mint with administrator privileges. The installation requires adding a third-party PPA ...
Read MoreHow to use OpenSSH Multiplexer To Speed Up OpenSSH Connections on Linux
This article will help you understand how to multiplex SSH sessions by setting up a master session and using a multiplexer to speed up SSH connections on Linux. What is SSH Multiplexing? SSH Multiplexing allows multiple SSH sessions to share a single TCP/IP connection. Instead of establishing separate connections for each SSH session, subsequent connections reuse the existing master connection, reducing server load and improving connection speed. SSH Multiplexing: Single Connection, Multiple Sessions Client Server Master TCP Connection ...
Read MoreFind if your Email Provider is Leaking Your IP Address
Many users are unaware that sending emails can disclose more information than intended, particularly through email headers that may contain sensitive data like your IP address. This information can reveal your approximate location and other private details to recipients. When you compose and send an email, additional metadata called header information is automatically attached. Depending on your email provider and the method used to send emails, this header may include your IP address, which recipients can use to determine your general location and other personal information. Email Header Information Flow ...
Read MoreCyber Attack Symptoms
A cyber attack can compromise your computer's security even when advanced antivirus software is installed. While regular system scans provide protection, attackers use sophisticated techniques that may bypass detection. Recognizing the warning signs of an active attack is crucial for immediate response and damage control. Understanding these symptoms helps identify potential breaches before significant damage occurs, allowing for prompt remediation actions. Common Cyber Attack Symptoms Process and Network Anomalies Unauthorized PowerShell activity − Unusual PowerShell processes running in Task Manager without user initiation indicate potential remote access or malware execution. Suspicious network ...
Read MoreRegistry Forensic
The Windows Registry is a central hierarchical database that stores configuration settings for applications, hardware devices, and users. Beyond system configuration, the Registry maintains extensive records of user activities, recently accessed files, and connected devices, making it a valuable source of forensic evidence. For forensic analysts and system administrators, the Registry provides crucial insights into system usage patterns and potential security incidents that may not be visible through other investigative methods. Windows Registry Structure Prior to Windows 95, system configuration was managed through individual files such as autoexec.bat, config.sys, win.ini, and system.ini. The Registry replaced this fragmented ...
Read More