Found 1301 Articles for MCA

What is the Trojan horse in Information Security?

Ginni
Updated on 22-Nov-2021 05:13:43

556 Views

A Trojan horse is a kind of malware that downloads onto a computer disguised as a legitimate issue. A Trojan horse is formal because of its delivery techniques, which generally defines an attacker uses social engineering to hide malicious codes inside legitimate software. However, unlike computer viruses or worms, a Trojan does not self-replicate, therefore it requires to be installed by a valid user.A trojan’s intent is frequently different than that of different forms of viruses or malware, which influence to be self-propagating to intensify damage regardless of their being revealed. The main goal of trojan’s is to remain hidden. ... Read More

What are Remote Access Trojans?

Ginni
Updated on 22-Nov-2021 05:13:01

161 Views

RAT represents Remote Access Trojan. It is a type of malware that supports the attacker with complete remote control over your system. When a RAT influences your computer, it enables the hacker to simply access your local files, secure login authorization, and different responsive data, or need that connection to download viruses you could unintentionally move on to others.A Remote Access Trojan (or RAT) is software that enables hackers’ backdoor management access to a computer. RATs are also referred to as Creepware. It is generally downloaded either as an invisible insert-on with software the user selects to access, including a ... Read More

What is (SPF) Sender Policy Framework?

Ginni
Updated on 22-Nov-2021 05:11:52

335 Views

SPF is a kind of email authentication protocol or a method for a recipient to confirm that an email is truly coming from the sender and is not an element of spam or a phishing attack.There are various types of email authentication used to safeguard against spam, containing DomainKeys Identified Mail (DKIM) and Domain-based Message Authentication, Reporting and Conformance (DMARC). Each email authentication protocol has several methods and objectives.SPF verifies sender IP addresses. It provides senders the power to tell recipients which IP addresses you’ve authorized to send an email on their behalf. If the email appears from an IP ... Read More

What is the difference between VPS and VDS?

Ginni
Updated on 22-Nov-2021 05:11:03

1K+ Views

Let us begin by understanding what VPS is.VPSVPS stands for the virtual private server. It is a virtual server that the user identifies as a dedicated/private server that still is installed on a physical computer running multiple operating systems. A virtual private server is called a virtual dedicated server (VDS).A virtual private server can include Web server software, a File Transfer Protocol program, a mail server program, and multiple types of application software for blogging e-commerce. Virtual private servers connect shared Web hosting services and dedicated hosting services by mixing the difference between them because virtual dedicated servers can have ... Read More

What is Media Gateway Control Protocol (MGCP)?

Ginni
Updated on 22-Nov-2021 05:09:56

487 Views

MGCP stands for Media Gateway Control Protocol. It represents a protocol that can be used to handle the components of a decomposed media gateway. Media gateways include endpoints on which the call agent can make, alter and remove links to create and control media sessions with several multimedia endpoints.The call agent can inform the endpoints to identify specific events and produce signals. The endpoints automatically interact with changes in the service state to the call agent. The call agent can audit endpoints and the links on endpoints. MGCP considers a call control architecture where the call control judgement is external ... Read More

What is PTP?

Ginni
Updated on 22-Nov-2021 05:08:47

523 Views

PTP represents Precision Time Protocol. It is an Ethernet or IP-based protocol for synchronizing time clocks on a set of web devices using a Master/Slave distribution structure.PTP is used for software that needs very high precision timing using Ethernet or Ethernet/IP. For instance, Telco applications including mobile, where not only frequency but also process precision is required to control hand-off of mobile phones from one cell tower to the next.The Precision Time Protocol (PTP) IEEE 1588 enables the precise cycle synchronization of multiple devices in an Ethernet system. When the clocks of the devices including cameras, workstations, and sensors, are ... Read More

What is the difference between Firebase and Parse Server?

Ginni
Updated on 22-Nov-2021 05:07:47

199 Views

Let us understand what a firebase is.FirebaseFirebase is a Backend-as-a-Service (Baas). It offers developers several devices and services to provide them create quality applications, increase their customer infrastructure, and earn profit. It is developed on Google’s infrastructure.The analytics dashboard is the important characteristic of Firebase, which is supplied with. It is clear and can inform 500 event types, each with 25 attributes. The dashboard is first-rate for identifying user behavior and calculating several user characteristics. It provides us to learn how people use our application so that it can better optimize it in the future.It can recognize custom audiences in ... Read More

What is MQTT?

Ginni
Updated on 22-Nov-2021 05:06:14

1K+ Views

MQTT represents Message Queuing Telemetry Transport. It is a highly lightweight and publish-subscribe messaging transport protocol. This protocol is useful for the connection with the remote area where the bandwidth is excellent. This nature makes it beneficial in multiple situations, including a stable environment such as communication device to device and the internet.MQTT was created by IBM in the late 1990s. Its initial software was to connect sensors on oil pipelines with satellites. It is a messaging protocol that supports asynchronous communication among parties.The MQTT broker is the center of each Publish/Subscribe protocol. It is based on the implementation, a ... Read More

What is STP?

Ginni
Updated on 22-Nov-2021 05:04:41

276 Views

STP represents Spanning Tree Protocol. It is a link management protocol created to provide a redundant connection that pause switching loops in the STP web. It is a Layer 2 protocol that runs on bridges and switches, which must be allowed on the switch interfaces.In an STP environment, the switches exchange data between themselves using bridge protocol data units (BPDU) and will then accept in on all ports for this BPDU message. Because a bridge is turned on, it necessarily considers that it is the root bridge in the STP tree.The STP application selects a root bridge and evaluates all ... Read More

What is HAN?

Ginni
Updated on 22-Nov-2021 05:03:41

264 Views

HAN represents the Home Area Network. It is a network that is set up and managed inside a small border, frequently a house or small office/home office (SOHO). It allows the connection and sharing of resources such as the Internet among computers, mobile and some devices over a network connection.The main hub of a HAN is the router. In some cases, the router is linked to a modem, which connects with an ISP. The modem supports an Internet connection to the router, which consecutively supports Internet access to all connected devices inside the home.In larger homes, a HAN can involve ... Read More

Advertisements