
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1045 Articles for Internet

1K+ Views
Before knowing which connection is best for internet usage Fiber, Copper, or wireless, we need to know the connections available and their functionality in different environments. The connection that the user selects depends on the usage, cost, installation location, services needed from the internet, and speed of data transfer when uploading or downloading a file or large volumes like movies, software tools, applications, etc. All types of internet connection depend on the bandwidth on how many units (represented by Mbps or Gbps per second) are used for streaming any live video or how frequently the user downloads or accesses cloud ... Read More

210 Views
In today's advanced age, protection and security have gotten to be major concerns for web clients. Whereas the web has made life more helpful and proficient, it has moreover made our data defenseless to cybercriminals, government observation, and other prying eyes. This is often where the Tor Browser comes into play. Tor, short for "The Onion Switch, " may be a free and open-source web browser that permits clients to browse the web namelessly and safely. In this article, we'll investigate what the Tor Browser is, how it works, and its points of interest and drawbacks. Users may ... Read More

306 Views
TCP Vegas is a modified TCP Vegas. It depends on Round Trip Time values on the accurate calculation of Base RTT. The TCP detects congestion that can be avoided at different Stages based on Round Trip Time(RTT). Here A stands for Adaptive. TCP Vegas emphasizes packet delay rather than loss of the packet. The TCP Vegas was first coined by Larry L Peterson and Lawrence Brakmo in 1994. The TCP Vegas has better throughput with less loss of packets by keeping packets in the congestion window to be smaller during the transmission. Definition TCP Vegas is an algorithm that avoids ... Read More

1K+ Views
In the area of cybersecurity, the requirement for robust and effective intrusion detection and prevention systems is critical. SNORT, a network intrusion detection and prevention system that is free and open-source, is one of the most well-known and commonly used systems in this area. Snort, which also notifies system administrators of potential security concerns. Martin Roesch created it for the first time in 1998, and since then it has grown to be one of the most popular network security tools worldwide. What is SNORT? The initial version of SNORT, an open-source network intrusion detection and prevention system, was made available ... Read More

4K+ Views
In the video on demand platform, YouTube is a popular one in the market. In such a demanding market to increase the audience a focus area should be a better experience and optimum video quality. This quality of the video depends on the streaming protocol it takes. Video streaming like YouTube prefers both TCP and UDP as per the goals and requirements. A TCP-based protocol known as Real-time Messaging Protocol (RTMP) is responsible for streaming video and audio content which provide low latency. The RTMP was developed by Macromedia. RTMP with a secure extension over a Transport layer security and ... Read More

694 Views
Everything on the internet that is not classified by and so accessible through a search engine like Google is referred to as the deep web. And on the other side, the dark web is a section of the internet that is hidden from search engines and can only be accessed with the anonymizing Tor browser. Dark Web is a division of the larger Deep web. The Dark Web and Deep Web use Tor to access hidden websites that are only accessible through anonymous information transmission services like Tor and that only hackers are aware of how to access. Although the ... Read More

553 Views
Wireless networks are getting to be an indispensable portion of our lives. They are utilized in homes, workplaces, open places, and indeed on the go. In any case, with the increment in utilization, there's also an increment in the potential for security breaches. A remote infiltration test (pentest) may be a strategy for testing the security of a remote arrange. This article will cover the nuts and bolts of remote pentest, counting its points of interest, drawbacks, importance, and requirements. What is a Wireless Pentest Basics? Wireless Pentesting (or Wireless Penetration Testing) is the process of assessing the security of ... Read More

316 Views
A technology called Wireless Fidelity (WiFi) enables wireless access to the internet and other networks. It has established itself as a standard in residences, workplaces, and public areas all across the world, offering millions of people ease and mobility. With the creation of modifications to the original WiFi standard, new features, and capabilities are continuously being added to WiFi technology. Since its beginning, WiFi innovation has experienced a few corrections, moving forward its execution and capabilities. In this article, we'll examine WiFi and its corrections. WiFi History The first release of 802.11 standards founded in 1997, marked the beginning of ... Read More

484 Views
Are you looking to increase your website's reach and better organize its content? If so, understanding a subdomain might be a great place to start. People often overlook subdomains as many do not have the knowledge or the time for them. But with just a little bit of understanding, subdomains can benefit small eCommerce stores and large enterprises. This blog post will explain these domain divisions and how you can use them effectively on your site! What is a Subdomain? A subdomain is a domain that is a subset of a bigger domain and is frequently used to arrange ... Read More

185 Views
In simple terms, website architecture is the visual and technical structure of the website. Web designers generally use the term while planning, designing, and developing a website. Technically, a website architecture is a logical website layout created per the user and business requirements. It is a collection of components that comprise a website and its services to the user. You can classify the components of website architecture into four parts Visual − It includes the user interface, buttons, colors, and other visual elements. Functional − It includes the type of services the website will provide. Technical − It ... Read More