Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Network Articles
Page 9 of 66
Trojan horse and Trap Door
A program threat is malicious software designed to compromise system security, steal data, or gain unauthorized access. Two of the most significant program threats are Trojan horses and trap doors (backdoors), which can cause data corruption, information theft, and system compromise. These threats exploit vulnerabilities in systems to perform unauthorized activities, making it crucial for organizations and individuals to understand their mechanisms and implement proper security measures. Security Violations Program threats can lead to several types of security violations: Data theft − Stealing sensitive information like credit card numbers, passwords, and financial data Unauthorized modification ...
Read MoreUnderstanding Web Authentication behind the login screen
Web Authentication is the process of verifying user credentials when accessing online accounts like e-commerce websites, social media platforms, or online banking services. Each user account is assigned a unique identifier and password, which are securely stored on web servers for future verification. Modern authentication also supports biometric methods like fingerprint scanning, facial recognition, and voice authentication. Consider Gmail as an example − during login, users must enter their username/email and password. Only when this combination matches the mail server database records will access be granted to the account and its services. Web Authentication ...
Read MoreUnicodes in computer network
Unicode is a universal character encoding standard that provides a consistent way to represent and handle text from all the world's writing systems. Developed by the Unicode Consortium in 1991, Unicode solves the limitations of ASCII by supporting millions of characters including letters, symbols, mathematical notations, and emojis from different languages and scripts. While ASCII can only represent 128-256 characters (sufficient only for English), Unicode can encode over 1.1 million characters, making it essential for modern global communications and computer networks. Unicode Character Encoding Coverage ASCII ...
Read MoreWide-Mouth Frog
The Wide-Mouth Frog protocol is a simple authentication protocol used in distributed systems to establish secure communication between entities through a trusted third party. Named metaphorically after the frog's ability to "open wide" and relay information, this protocol enables secure key distribution and mutual authentication in network environments. The protocol operates with three entities: two parties wanting to communicate securely (typically Alice and Bob) and a trusted Key Distribution Center (KDC). The Wide-Mouth Frog protocol is particularly useful in scenarios where direct key exchange between parties is not feasible or secure. How Wide-Mouth Frog Protocol Works The ...
Read MoreWhat is QUAD9 Technology
Quad9 is a free public DNS resolver that protects users from malware, spyware, botnets, and other security threats. Operated by the Swiss-based non-profit Quad9 Foundation, it provides enhanced security and privacy by blocking access to malicious websites while maintaining GDPR compliance through strict data protection policies. Unlike traditional DNS services that may collect and monetize user data, Quad9 does not store or log users' IP addresses. It blocks malicious domains using real-time threat intelligence from cybersecurity experts and companies, preventing devices from connecting to known dangerous websites. How Quad9 Works Quad9 operates as a recursive DNS resolver, ...
Read MoreData Security in Computer Network
Data security is the practice of protecting digital information from unauthorized access, theft, corruption, or destruction throughout its entire lifecycle. It encompasses the implementation of policies, procedures, and technical controls to safeguard sensitive data in computer networks and systems. Data security is built upon the CIA Triad − three fundamental principles that guide security implementations: Confidentiality ensures only authorized users can access data, Integrity maintains data accuracy and prevents unauthorized modifications, and Availability guarantees legitimate users can access data when needed. CIA Triad in Data Security ...
Read MoreData Communication-Definition, components, Types, Channels?
Data communication is the process of transferring digital information between two or more devices or nodes in a computer network. It enables devices to exchange data, share resources, and coordinate activities regardless of their physical location. Modern data communication systems have revolutionized how we interact, enabling instant messaging, video calls, file sharing, and remote collaboration across vast distances through both wired and wireless technologies. Components of Data Communication A data communication system consists of five essential components that work together to ensure successful transmission: Message − The information or data to be transmitted, which ...
Read MoreDetails of DNS
The Domain Name System (DNS) is a fundamental component of the internet that enables users to access websites and online resources using human-readable domain names instead of numerical IP addresses. DNS acts as the internet's phone book, translating domain names like google.com into machine-readable IP addresses like 192.168.1.1. This translation system is essential because it allows users to navigate the web using memorable domain names rather than having to memorize complex strings of numbers. Without DNS, accessing websites would require users to remember IP addresses for every site they want to visit, making the internet far less user-friendly. ...
Read MoreDeep Web: The Dark Side of Internet
The deep web refers to all parts of the internet that are not indexed by standard search engines like Google, Bing, or Yahoo. This includes password-protected sites, private databases, email inboxes, and internal company pages. The dark web is a small subset of the deep web that requires special software like Tor to access and is intentionally hidden from conventional browsers. While often confused, these terms represent different concepts. The deep web is largely legitimate content that simply isn't publicly searchable, whereas the dark web specifically refers to encrypted networks designed for anonymity. Layers ...
Read MoreWPAN Technologies for IoT/M2M
Internet of Things (IoT) devices connect to real-world entities to send and receive data over the internet. Here "Things" refers to any physical entities like smartwatches, health monitoring devices, home appliances, and traffic systems. These devices analyze information from their surroundings and make decisions with minimal human interaction, transmitting results through connected networks to receiver devices such as laptops, tablets, or smartphones. Machine to Machine (M2M) communication enables two or more devices to share functions and data within the same network. These devices can exchange, analyze, and transmit data without human intervention, operating with or without internet connectivity. M2M ...
Read More