- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 157 Articles for Networking
72 Views
Let us understand the concepts of HCL Connections and Tresorit before learning the differences between them.HCL ConnectionsIt is a social software application developed by IBM in 2007 and later owned by HCL technologies in the year 2019. It is a collaboration tool which assists customers and business people with communication and workflow management.It is mainly designed for file sharing, online meetings, and instant messaging. The programming language used is java and javascript.CharacteristicsThe characteristics of HCL are as follows −Collaboration analytics.Direct source capture.Content monitoring.Message threading and attachments.Contextual capture.Profile and identity management.Powerful search.Video conferencing.External archive support.Contact management.AdvantagesThe advantages of HCL connection are ... Read More
8K+ Views
Let us understand the concepts of Pretty Good Privacy (PGP) and Secure/Multipurpose Internet mail extension (S/MIME) before learning the differences between them.Pretty Good Privacy (PGP)The full form of PGP is Pretty Good Privacy which is used to provide email with privacy, integrity and authentication.PGP can be helpful in creating secure email messages. It sends the original data into encrypted form called unreadable ciphertext and passed to receiver where data is decrypted into original form by receiver key.For example, consider two users Ram and Hari. Ram creates a session key to encrypt the message and he also encrypts the session key ... Read More
1K+ Views
Let us understand the concepts of Internet of Things (IoT) and Internet of Everything (IoE) before learning the differences between them. Internet of Things (IoT) IoT is called the Internet of Things and it is nothing but an interlinkage between various items that means, the physical items interact with each other and with the external environment with the help of the internet. They can respond to certain external changes and can work in an artificially intelligent manner. It is also helpful in making certain decisions based on the pattern recognition technique.For example − Every morning at 6am the coffee machine ... Read More
5K+ Views
Let us begin by learning about a security group in Amazon Web Services (AWS).Security Group in AWSA Security group acts as a virtual firewall which controls the traffic for one or more instances whenever we launch an instance, we can specify one or more security groups. Generally, we use the default security group.If you have requirements that are not met by a security group, we can maintain our own firewall on any of our instances in addition to using security groups. If we need to allow traffic to a window instance we can use Amazon EC2 security group.AWS security group ... Read More
89 Views
Let us begin by understanding the concept of Direct-attached storage (DAS).Direct-attached storage (DAS)DAS is called Direct-attached storage (DAS) which is a computer storage that is connected to one computer and not accessible to other computers. For an individual computer user, the hard drive is the usual form of direct-attached storage.For example − hard drives, solid-state drives, optical disc drives, and storage on external drives.The main components of DAS are as follows −Main HubDistribution MediumRemote EquipmentAntennasThe advantage of DAS is that DAS cannot use the switches or any server or network connection it directly connects with the motherboard.The disadvantage of DAS ... Read More
135 Views
Let us understand the concepts of Phishing and Spear Phishing before learning the differences between them.PhishingIt is generally done to obtain sensitive information like credit card pins, email id password, social messaging site password .It is a technique or method by which the attacker tries to access the data of a normal person, company or any institution and steals the information.It is done by sending page to user via email or SMS that is similar to the original web page and user login to that fake page and enter details and these details are then fetched by hackersPhishing is general ... Read More
434 Views
The full form of WPS is WIFI Protected Setup and it is a newly invented method. In this method a new device is added to the wireless network access point using just a Password or a Pin or simply by clicking a button.When a user pushes a button on the access point the network is visible to the user and he can connect to it with a password or a PIN and as soon as it is done the network becomes invisible and thus it reduces vulnerability. So it is a method of adding a new device to a network ... Read More
7K+ Views
Let us understand the concepts of twisted pair cable, optical fiber cable and coaxial cable before learning the differences between them.Twisted Pair CableTwisted pair cable is made up of two insulated conductor wires twisted together.AdvantagesThe advantages of Twisted Pair cable are as follows −Inexpensive and readily available.FlexibleLight WeightEasy to setup and InstallIt supports Analog and digital transmission.DisadvantagesThe disadvantages of Twisted Pair cable are as follows −Low bandwidthNoise proneTransmission Limits.Fiber Optic CableFiber Optic Cable is made up of glass and the data signal travels in the form of light.AdvantagesThe advantages of Optical Fiber cable are as follows −Extremely high bandwidth.Easy to ... Read More
63 Views
Let us understand the concepts of CloudMe and ZumoDrive before learning the differences between them.ZumoDriveIt was owned by Zecter in the year 2009 and is the hybrid cloud storage which is used to store all your media. It is supported by Windows, macOS, Linux, iOS, Android, webOS operating system.It is designed to connect to the Internet and adds a Windows Firewall. When we install, it will add a context menu handler to the Windows shell in order to provide quick access to the program.zumodrive.exe is an executable program which has seen to consume an average CPU of less than one ... Read More
74 Views
Let us understand the concepts of Amazon Drive and ZumoDrive before learning the differences between them.ZumoDriveIt was owned by Zecter in the year 2009 and is the hybrid cloud storage which is used to store all your media. It is supported by Windows, macOS, Linux, iOS, Android, webOS operating system.It is designed to connect to the Internet and adds a Windows Firewall. When we install, it will add a context menu handler to the Windows shell in order to provide quick access to the program.zumodrive.exe is an executable program which has seen to consume an average CPU of less than ... Read More