Network Articles

Page 9 of 66

Trojan horse and Trap Door

Pranavnath
Pranavnath
Updated on 16-Mar-2026 4K+ Views

A program threat is malicious software designed to compromise system security, steal data, or gain unauthorized access. Two of the most significant program threats are Trojan horses and trap doors (backdoors), which can cause data corruption, information theft, and system compromise. These threats exploit vulnerabilities in systems to perform unauthorized activities, making it crucial for organizations and individuals to understand their mechanisms and implement proper security measures. Security Violations Program threats can lead to several types of security violations: Data theft − Stealing sensitive information like credit card numbers, passwords, and financial data Unauthorized modification ...

Read More

Understanding Web Authentication behind the login screen

Pranavnath
Pranavnath
Updated on 16-Mar-2026 794 Views

Web Authentication is the process of verifying user credentials when accessing online accounts like e-commerce websites, social media platforms, or online banking services. Each user account is assigned a unique identifier and password, which are securely stored on web servers for future verification. Modern authentication also supports biometric methods like fingerprint scanning, facial recognition, and voice authentication. Consider Gmail as an example − during login, users must enter their username/email and password. Only when this combination matches the mail server database records will access be granted to the account and its services. Web Authentication ...

Read More

Unicodes in computer network

Pranavnath
Pranavnath
Updated on 16-Mar-2026 1K+ Views

Unicode is a universal character encoding standard that provides a consistent way to represent and handle text from all the world's writing systems. Developed by the Unicode Consortium in 1991, Unicode solves the limitations of ASCII by supporting millions of characters including letters, symbols, mathematical notations, and emojis from different languages and scripts. While ASCII can only represent 128-256 characters (sufficient only for English), Unicode can encode over 1.1 million characters, making it essential for modern global communications and computer networks. Unicode Character Encoding Coverage ASCII ...

Read More

Wide-Mouth Frog

Pranavnath
Pranavnath
Updated on 16-Mar-2026 527 Views

The Wide-Mouth Frog protocol is a simple authentication protocol used in distributed systems to establish secure communication between entities through a trusted third party. Named metaphorically after the frog's ability to "open wide" and relay information, this protocol enables secure key distribution and mutual authentication in network environments. The protocol operates with three entities: two parties wanting to communicate securely (typically Alice and Bob) and a trusted Key Distribution Center (KDC). The Wide-Mouth Frog protocol is particularly useful in scenarios where direct key exchange between parties is not feasible or secure. How Wide-Mouth Frog Protocol Works The ...

Read More

What is QUAD9 Technology

Pranavnath
Pranavnath
Updated on 16-Mar-2026 522 Views

Quad9 is a free public DNS resolver that protects users from malware, spyware, botnets, and other security threats. Operated by the Swiss-based non-profit Quad9 Foundation, it provides enhanced security and privacy by blocking access to malicious websites while maintaining GDPR compliance through strict data protection policies. Unlike traditional DNS services that may collect and monetize user data, Quad9 does not store or log users' IP addresses. It blocks malicious domains using real-time threat intelligence from cybersecurity experts and companies, preventing devices from connecting to known dangerous websites. How Quad9 Works Quad9 operates as a recursive DNS resolver, ...

Read More

Data Security in Computer Network

Pranavnath
Pranavnath
Updated on 16-Mar-2026 2K+ Views

Data security is the practice of protecting digital information from unauthorized access, theft, corruption, or destruction throughout its entire lifecycle. It encompasses the implementation of policies, procedures, and technical controls to safeguard sensitive data in computer networks and systems. Data security is built upon the CIA Triad − three fundamental principles that guide security implementations: Confidentiality ensures only authorized users can access data, Integrity maintains data accuracy and prevents unauthorized modifications, and Availability guarantees legitimate users can access data when needed. CIA Triad in Data Security ...

Read More

Data Communication-Definition, components, Types, Channels?

Pranavnath
Pranavnath
Updated on 16-Mar-2026 12K+ Views

Data communication is the process of transferring digital information between two or more devices or nodes in a computer network. It enables devices to exchange data, share resources, and coordinate activities regardless of their physical location. Modern data communication systems have revolutionized how we interact, enabling instant messaging, video calls, file sharing, and remote collaboration across vast distances through both wired and wireless technologies. Components of Data Communication A data communication system consists of five essential components that work together to ensure successful transmission: Message − The information or data to be transmitted, which ...

Read More

Details of DNS

Pranavnath
Pranavnath
Updated on 16-Mar-2026 2K+ Views

The Domain Name System (DNS) is a fundamental component of the internet that enables users to access websites and online resources using human-readable domain names instead of numerical IP addresses. DNS acts as the internet's phone book, translating domain names like google.com into machine-readable IP addresses like 192.168.1.1. This translation system is essential because it allows users to navigate the web using memorable domain names rather than having to memorize complex strings of numbers. Without DNS, accessing websites would require users to remember IP addresses for every site they want to visit, making the internet far less user-friendly. ...

Read More

Deep Web: The Dark Side of Internet

Pranavnath
Pranavnath
Updated on 16-Mar-2026 832 Views

The deep web refers to all parts of the internet that are not indexed by standard search engines like Google, Bing, or Yahoo. This includes password-protected sites, private databases, email inboxes, and internal company pages. The dark web is a small subset of the deep web that requires special software like Tor to access and is intentionally hidden from conventional browsers. While often confused, these terms represent different concepts. The deep web is largely legitimate content that simply isn't publicly searchable, whereas the dark web specifically refers to encrypted networks designed for anonymity. Layers ...

Read More

WPAN Technologies for IoT/M2M

Pranavnath
Pranavnath
Updated on 16-Mar-2026 2K+ Views

Internet of Things (IoT) devices connect to real-world entities to send and receive data over the internet. Here "Things" refers to any physical entities like smartwatches, health monitoring devices, home appliances, and traffic systems. These devices analyze information from their surroundings and make decisions with minimal human interaction, transmitting results through connected networks to receiver devices such as laptops, tablets, or smartphones. Machine to Machine (M2M) communication enables two or more devices to share functions and data within the same network. These devices can exchange, analyze, and transmit data without human intervention, operating with or without internet connectivity. M2M ...

Read More
Showing 81–90 of 655 articles
« Prev 1 7 8 9 10 11 66 Next »
Advertisements