Found 1515 Articles for Computer Network

What is Tor Browser?

Pranavnath
Updated on 12-Apr-2023 16:02:48

210 Views

In today's advanced age, protection and security have gotten to be major concerns for web clients. Whereas the web has made life more helpful and proficient, it has moreover made our data defenseless to cybercriminals, government observation, and other prying eyes. This is often where the Tor Browser comes into play. Tor, short for "The Onion Switch, " may be a free and open-source web browser that permits clients to browse the web namelessly and safely. In this article, we'll investigate what the Tor Browser is, how it works, and its points of interest and drawbacks. Users may ... Read More

What is Time-To-Live (TTL)?

Pranavnath
Updated on 12-Apr-2023 16:01:54

1K+ Views

Time to Live (TTL) is a term used in computer science to describe how long a network packet will contain data. It is a value inside the packet header that represents the most router hops a packet may make before being dropped. When a packet travels through a network, it is forwarded from one router to another until it arrives at its final destination. The packet header's TTL value decreases with each router it passes through. The packet is dropped and not transmitted any further when the TTL is 0, halting its endless circulation. Time to Live (TTL) The TTL ... Read More

What is Stuxnet Attack?

Pranavnath
Updated on 12-Apr-2023 16:01:02

344 Views

Stuxnet is a computer worm that was found in 2010 and is considered to be one of the foremost advanced cyber weapons ever found. It is considered to have been outlined to target and disrupt Iran's atomic program by causing the centrifuges utilized in uranium enhancement to break down. Stuxnet was outlined to spread through tainted USB drives and other detachable media, and it utilized several progressed procedures to sidestep discovery and keep up control over contaminated frameworks. It was able to misuse different zero-day vulnerabilities in Microsoft Windows, which made it exceptionally troublesome to distinguish and expel. Stuxnet ... Read More

What is Stateful Inspection?

Pranavnath
Updated on 12-Apr-2023 15:58:52

234 Views

Stateful inspection is a technique used to restrict the traffic flow between networks. It will observe the live connections in the network and based on it, it allows and restricts the packet’s access based on the security policies. It most key element in tracing is the state of network sessions. Accessibility depends on the session state. ‘Dynamic Packeting Filtering’ is the other name. And this technology is related to a firewall so it restricts accessibility through the firewall. The state specifies the process status and the context is the content or data of the packet including the IP address ... Read More

What is Router?

Pranavnath
Updated on 12-Apr-2023 15:56:52

1K+ Views

A router is an electronic device that connects two or more computer networks and forwards data packets between them. It is an essential component of any modern network infrastructure, from small home networks to large enterprise networks. It does so much customizable filtering when a message passes through the router. If the router admin wishes to block some domain names he can customize them. There are so many such customizations that can be made on the router level. In this article, we will explore what a router is, how it works, and its various types and applications. Definition Routers are ... Read More

What is Remote Code Execution (RCE) ?

Pranavnath
Updated on 12-Apr-2023 15:55:39

408 Views

Remote code execution(RCE) is an arbitrary code running on a remote system using security vulnerability and connecting it to a private or public network. Physical access is not required. The RCE can have severe consequences of Malware, loss of data, Service disruption, and ransomware deployment. The RCE vulnerability is exploited by the attacker without any access to the victim's system. When we download malicious software or application then it gives rise to the use of RCE by cyber attackers. The OWASP has recognized Remote procedure code as a vulnerability for cyber attacks. Overview Definition Remote Code Execution is a remote ... Read More

Vegas A (Modified TCP-Vegas)

Pranavnath
Updated on 12-Apr-2023 15:54:41

306 Views

TCP Vegas is a modified TCP Vegas. It depends on Round Trip Time values on the accurate calculation of Base RTT. The TCP detects congestion that can be avoided at different Stages based on Round Trip Time(RTT). Here A stands for Adaptive. TCP Vegas emphasizes packet delay rather than loss of the packet. The TCP Vegas was first coined by Larry L Peterson and Lawrence Brakmo in 1994. The TCP Vegas has better throughput with less loss of packets by keeping packets in the congestion window to be smaller during the transmission. Definition TCP Vegas is an algorithm that avoids ... Read More

Unknown Facts Of Networking

Pranavnath
Updated on 12-Apr-2023 15:53:38

2K+ Views

Networking is the procedure to connect various devices and systems, allowing communication and exchange of information. It has become now a necessary aspect of our day-today lives, with the internet and other networked technologies opening us to work and learn to socialize on a global scale. Yet despite its presence everywhere, there are many unknown facts about networking that even tech-savvy individuals might not be aware of. In this article, we will traverse some of these lesser-known facts and shed light on the interesting word of networking. Unknown facts of Networking The first computer network was made in the 1960s ... Read More

Types of VoIP hacking and counter measures

Pranavnath
Updated on 12-Apr-2023 15:52:06

525 Views

Voice over internet protocol is related to the collection of different technology that allows the easy and effective delivery of voice communication, video, audio, and images with the help of the data network through internet protocol. It can also be referred to as a technology that makes it very easier to make voice calls by making use of Internet connections. VoIP makes it very easier and more flexible to make calls as compared to the traditional telephone system. To reduce voice over Internet protocol hacking it is important to incorporate various measures that could include designing a strong password ... Read More

Types Of Spanning Tree Protocol (STP)

Pranavnath
Updated on 12-Apr-2023 15:51:08

1K+ Views

STP is one type of network in the computer science field. It is 2 network layer protocol that is used to obstruct problems that appear while computers contest to use shared telecommunications paths through a local area network. A similar segment is ascenders for another segment and affords accordingly, network segmentation helps in decreasing the competition for other networks and also decreases the chances of a network coming to the network platform. It’s very easy to use and it’s also effective in providing support for bridges and switches. It helps in providing a link and reducing redundancy and preventing ... Read More

Advertisements