
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1515 Articles for Computer Network

3K+ Views
A threat is designed by hijackers to change the behavior of the process. The threat can reach the system through any path to our system or any organization sever. When the attack happens, it leads to the corruption of data, the stealing of personal information, and the loss of data. The Trojan horse and trap door are some of the program threats which need to be avoided for the proper functioning of the system. So it is a great deal to protect the system from program threats. The protection of files and other resources from misusing the data is important. ... Read More

1K+ Views
In the digital world, everybody is accessible to applications, digital systems, and software. We get the details of the things we want easily on the internet today, so it is a positive change in our lives. But compared to the positive one, we should deal with the negative thing also. And the main challenge is cyber-attacks. It has been increasing every year when people try to access vulnerable sites. The main objective of cyber-attacks is data manipulation, stealing of data, and decreasing the performance of the system. There are many types of cyber-attacks and some of them are given here. ... Read More

1K+ Views
In this article, we will see the top 10 common security log sources that are being developed and used by companies. Log Sources are a type of data source that creates an event log in an organization. The log is nothing but the records with data. An event log is a tool that has software and hardware-related information. When any security threat occurs, these logs help the security specialists to use this information in the event logs for security management. Event logs are generated in a computer system that has the stuff for identifying the bugs, risks, or threats. Every ... Read More

863 Views
Introduction Server security is essential for any business or organization that relies on a server to store, process, and share data. A secure server ensures that sensitive information is protected from unauthorized access, theft, and cyberattacks. In this article, we will share 21 server security tips to help you secure your server and safeguard your data. Keep Your Server Software Updated One of most important server security tips is to keep your server software updated. Software updates often include security patches that address known vulnerabilities. Failure to update your software can leave your server open to attacks. Use Strong Passwords ... Read More

606 Views
Networking and microcontrollers have become ubiquitous in modern world, with demand for connected devices and smart homes on rise. If you’re looking to expand your knowledge on these topics, there are a plethora of books that can help you gain a better understanding of networking and microcontrollers. In this article, we’ll explore some of best books to read on networking and microcontrollers, along with their examples and sub-headings. "TCP/IP Illustrated, Volume 1: Protocols" by W. Richard Stevens TCP/IP Illustrated is a comprehensive guide to TCP/IP protocol suite, which is foundation of internet. This book covers all aspects of TCP/IP protocol, ... Read More

2K+ Views
The Internet and WAP (Wireless Application Protocol) are wireless communication and information access technologies. WAP is a technology created especially for movable electronics like cell phones and PDAs. It enables these devices to connect to the Internet and give information in a streamlined layout that's easy to read and use on a small screen. Wireless Markup Language (WML), as opposed to the HTML used on standard sites, is the markup language used for WAP pages, which are specifically designed for mobile devices. As we know, the internet gives access to a wide range of services and information which include sites, ... Read More

643 Views
In today's world, the internet has become an integral part of our daily lives. With its growing popularity, it's crucial to safeguard our online activities from potential threats. One of the most effective ways to achieve this is by using a proxy server. To start, let's define what a proxy server is. It acts as an intermediary between your device and the internet. Whenever you request a webpage, the request goes through the proxy server before reaching the internet. The server then sends the webpage back to your device. This process is invisible to the user and provides various benefits. ... Read More

2K+ Views
If you want to save money on your phone bills, setting up a VoIP phone at home is a great alternative. VoIP, or Voice over Internet Protocol, is a technology that enables phone conversations to be made over the internet. Not only is VoIP cheaper than traditional phone services, but it also delivers superior call quality and a range of innovative capabilities. We'll guide you through the steps of establishing a VoIP phone at home in this article. Step 1: Selecting a VoIP Service Provider The first step in installing a VoIP phone at home is selecting a VoIP service ... Read More

354 Views
We all rely extensively on the internet for our daily activities in today's digital world. We all utilise numerous websites and programmes to do these duties, whether it's online shopping, social networking, or internet banking. While the internet has made our lives easier, it has also introduced new vulnerabilities like as cross-site scripting (XSS), cross-site request forgery (CSRF), and cross-site resource forgery (XSRF). These flaws may cause severe harm, ranging from data theft to website defacement, and can even endanger people's lives. In this post, we'll look at how you may limit your vulnerability to these assaults. What are XSS, ... Read More

1K+ Views
Traceroute is a robust network diagnostic tool that assists you in analysing network performance and diagnosing network issues. You may map out the path that your network traffic travels from your computer to a remote server using traceroute, and find any bottlenecks or other difficulties along the way. Recognizing Traceroute Before learning how to interpret a traceroute, you should first grasp how it works. When you perform a traceroute, it transmits data packets with increasing time-to-live (TTL) values to the destination server. Each router along the way decrements the TTL value, and if it reaches zero, the router sends an ... Read More