- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1310 Articles for Computer Network

Updated on 14-Mar-2023 16:03:55
Networking and microcontrollers have become ubiquitous in modern world, with demand for connected devices and smart homes on rise. If you’re looking to expand your knowledge on these topics, there are a plethora of books that can help you gain a better understanding of networking and microcontrollers. In this article, we’ll explore some of best books to read on networking and microcontrollers, along with their examples and sub-headings. "TCP/IP Illustrated, Volume 1: Protocols" by W. Richard Stevens TCP/IP Illustrated is a comprehensive guide to TCP/IP protocol suite, which is foundation of internet. This book covers all aspects of TCP/IP protocol, ... Read More 
Updated on 06-Mar-2023 10:55:56
The Internet and WAP (Wireless Application Protocol) are wireless communication and information access technologies. WAP is a technology created especially for movable electronics like cell phones and PDAs. It enables these devices to connect to the Internet and give information in a streamlined layout that's easy to read and use on a small screen. Wireless Markup Language (WML), as opposed to the HTML used on standard sites, is the markup language used for WAP pages, which are specifically designed for mobile devices. As we know, the internet gives access to a wide range of services and information which include sites, ... Read More 
Updated on 27-Feb-2023 12:49:46
In today's world, the internet has become an integral part of our daily lives. With its growing popularity, it's crucial to safeguard our online activities from potential threats. One of the most effective ways to achieve this is by using a proxy server. To start, let's define what a proxy server is. It acts as an intermediary between your device and the internet. Whenever you request a webpage, the request goes through the proxy server before reaching the internet. The server then sends the webpage back to your device. This process is invisible to the user and provides various benefits. ... Read More 
Updated on 27-Feb-2023 12:47:26
If you want to save money on your phone bills, setting up a VoIP phone at home is a great alternative. VoIP, or Voice over Internet Protocol, is a technology that enables phone conversations to be made over the internet. Not only is VoIP cheaper than traditional phone services, but it also delivers superior call quality and a range of innovative capabilities. We'll guide you through the steps of establishing a VoIP phone at home in this article. Step 1: Selecting a VoIP Service Provider The first step in installing a VoIP phone at home is selecting a VoIP service ... Read More 
Updated on 27-Feb-2023 12:45:52
We all rely extensively on the internet for our daily activities in today's digital world. We all utilise numerous websites and programmes to do these duties, whether it's online shopping, social networking, or internet banking. While the internet has made our lives easier, it has also introduced new vulnerabilities like as cross-site scripting (XSS), cross-site request forgery (CSRF), and cross-site resource forgery (XSRF). These flaws may cause severe harm, ranging from data theft to website defacement, and can even endanger people's lives. In this post, we'll look at how you may limit your vulnerability to these assaults. What are XSS, ... Read More 
Updated on 27-Feb-2023 12:44:10
Traceroute is a robust network diagnostic tool that assists you in analysing network performance and diagnosing network issues. You may map out the path that your network traffic travels from your computer to a remote server using traceroute, and find any bottlenecks or other difficulties along the way. Recognizing Traceroute Before learning how to interpret a traceroute, you should first grasp how it works. When you perform a traceroute, it transmits data packets with increasing time-to-live (TTL) values to the destination server. Each router along the way decrements the TTL value, and if it reaches zero, the router sends an ... Read More 
Updated on 27-Feb-2023 12:42:11
Ransomware is a type of malware that has been a growing threat to individuals, organizations, and governments worldwide. Ransomware encrypts the victim's files and demands a ransom in exchange for the decryption key. The ransom can be a significant amount of money, and paying it does not guarantee the recovery of the encrypted data. In this article, we will explore how to prevent ransomware attacks and protect your data from this malicious threat. Keep Your Software Up to Date Keeping your software up to date is an essential step in preventing ransomware attacks. Software developers regularly release updates to fix ... Read More 
Updated on 27-Feb-2023 12:41:16
As more and more services move online, the importance of access control becomes increasingly clear. Access control refers to the processes that limit the ability of unauthorized individuals or entities to access resources, whether those resources are software, data, or physical spaces. Broken access control is one of the most common vulnerabilities in software, and it's also one of the most damaging. In this article, we'll explore what broken access control is, what its consequences can be, and most importantly, how to prevent it. What is Broken Access Control? Broken access control refers to a situation in which an attacker ... Read More 
Updated on 27-Feb-2023 12:39:39
On Windows 10, take these steps to alter the MAC address of a wired adapter − Step 1: Go to the Device Manager Right-click on the Start button and select Device Management from the menu that displays to enter the Device Manager. Instead, press Windows key + X and choose Device Manager from the menu. Step 2: Locate the Network Adapter Expand the Network Adapters section in the Device Manager and locate the wired adapter that you want to modify. Right-click the adapter and select Properties from the menu that appears. Step 3: Modify the MAC Address In the Properties ... Read More 
Updated on 27-Feb-2023 12:37:52
PeStudio is a popular and powerful software analysis tool that allows users to analyze executable files for various Windows operating systems. The software was developed by the Belgian company, Marc Ochsenmeier, and is widely used by malware analysts, software developers, and security researchers around the world. We will provide an overview of what PeStudio is, how it works, features it provides to its users. The article also includes limitations and recent advancements of PeStudio. What is PeStudio? PeStudio is a tool that provides users with a detailed analysis of executable files, specifically those running on Windows operating systems. The software ... Read More Advertisements