Found 1515 Articles for Computer Network

Trojan horse and Trap Door

Pranavnath
Updated on 28-Mar-2023 17:12:31

3K+ Views

A threat is designed by hijackers to change the behavior of the process. The threat can reach the system through any path to our system or any organization sever. When the attack happens, it leads to the corruption of data, the stealing of personal information, and the loss of data. The Trojan horse and trap door are some of the program threats which need to be avoided for the proper functioning of the system. So it is a great deal to protect the system from program threats. The protection of files and other resources from misusing the data is important. ... Read More

Types of Cyber Attacks

Pranavnath
Updated on 28-Mar-2023 17:10:05

1K+ Views

In the digital world, everybody is accessible to applications, digital systems, and software. We get the details of the things we want easily on the internet today, so it is a positive change in our lives. But compared to the positive one, we should deal with the negative thing also. And the main challenge is cyber-attacks. It has been increasing every year when people try to access vulnerable sites. The main objective of cyber-attacks is data manipulation, stealing of data, and decreasing the performance of the system. There are many types of cyber-attacks and some of them are given here. ... Read More

Top 10 Common Security Log Sources

Pranavnath
Updated on 28-Mar-2023 17:07:24

1K+ Views

In this article, we will see the top 10 common security log sources that are being developed and used by companies. Log Sources are a type of data source that creates an event log in an organization. The log is nothing but the records with data. An event log is a tool that has software and hardware-related information. When any security threat occurs, these logs help the security specialists to use this information in the event logs for security management. Event logs are generated in a computer system that has the stuff for identifying the bugs, risks, or threats. Every ... Read More

21 Server Security Tips to Secure Your Server

Satish Kumar
Updated on 08-Jan-2025 14:17:52

863 Views

Introduction Server security is essential for any business or organization that relies on a server to store, process, and share data. A secure server ensures that sensitive information is protected from unauthorized access, theft, and cyberattacks. In this article, we will share 21 server security tips to help you secure your server and safeguard your data. Keep Your Server Software Updated One of most important server security tips is to keep your server software updated. Software updates often include security patches that address known vulnerabilities. Failure to update your software can leave your server open to attacks. Use Strong Passwords ... Read More

Books to read on networking and microcontrollers

Satish Kumar
Updated on 14-Mar-2023 16:03:55

606 Views

Networking and microcontrollers have become ubiquitous in modern world, with demand for connected devices and smart homes on rise. If you’re looking to expand your knowledge on these topics, there are a plethora of books that can help you gain a better understanding of networking and microcontrollers. In this article, we’ll explore some of best books to read on networking and microcontrollers, along with their examples and sub-headings. "TCP/IP Illustrated, Volume 1: Protocols" by W. Richard Stevens TCP/IP Illustrated is a comprehensive guide to TCP/IP protocol suite, which is foundation of internet. This book covers all aspects of TCP/IP protocol, ... Read More

Difference between WAP and the Internet

Md. Sajid
Updated on 06-Mar-2023 10:55:56

2K+ Views

The Internet and WAP (Wireless Application Protocol) are wireless communication and information access technologies. WAP is a technology created especially for movable electronics like cell phones and PDAs. It enables these devices to connect to the Internet and give information in a streamlined layout that's easy to read and use on a small screen. Wireless Markup Language (WML), as opposed to the HTML used on standard sites, is the markup language used for WAP pages, which are specifically designed for mobile devices. As we know, the internet gives access to a wide range of services and information which include sites, ... Read More

How to set up and use a proxy server?

sudhir sharma
Updated on 27-Feb-2023 12:49:46

643 Views

In today's world, the internet has become an integral part of our daily lives. With its growing popularity, it's crucial to safeguard our online activities from potential threats. One of the most effective ways to achieve this is by using a proxy server. To start, let's define what a proxy server is. It acts as an intermediary between your device and the internet. Whenever you request a webpage, the request goes through the proxy server before reaching the internet. The server then sends the webpage back to your device. This process is invisible to the user and provides various benefits. ... Read More

How to Set Up a VoIP Phone at Home?

sudhir sharma
Updated on 27-Feb-2023 12:47:26

2K+ Views

If you want to save money on your phone bills, setting up a VoIP phone at home is a great alternative. VoIP, or Voice over Internet Protocol, is a technology that enables phone conversations to be made over the internet. Not only is VoIP cheaper than traditional phone services, but it also delivers superior call quality and a range of innovative capabilities. We'll guide you through the steps of establishing a VoIP phone at home in this article. Step 1: Selecting a VoIP Service Provider The first step in installing a VoIP phone at home is selecting a VoIP service ... Read More

How to Reduce Risk of Exposure to CSRF, XSRF, or XSS Attacks?

sudhir sharma
Updated on 27-Feb-2023 12:45:52

354 Views

We all rely extensively on the internet for our daily activities in today's digital world. We all utilise numerous websites and programmes to do these duties, whether it's online shopping, social networking, or internet banking. While the internet has made our lives easier, it has also introduced new vulnerabilities like as cross-site scripting (XSS), cross-site request forgery (CSRF), and cross-site resource forgery (XSRF). These flaws may cause severe harm, ranging from data theft to website defacement, and can even endanger people's lives. In this post, we'll look at how you may limit your vulnerability to these assaults. What are XSS, ... Read More

How to Read a Traceroute?

sudhir sharma
Updated on 27-Feb-2023 12:44:10

1K+ Views

Traceroute is a robust network diagnostic tool that assists you in analysing network performance and diagnosing network issues. You may map out the path that your network traffic travels from your computer to a remote server using traceroute, and find any bottlenecks or other difficulties along the way. Recognizing Traceroute Before learning how to interpret a traceroute, you should first grasp how it works. When you perform a traceroute, it transmits data packets with increasing time-to-live (TTL) values to the destination server. Each router along the way decrements the TTL value, and if it reaches zero, the router sends an ... Read More

Advertisements