Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Technology Articles - Page 5 of 19
927 Views
In today's digital world, cyber attacks are becoming increasingly sophisticated, and organizations must continuously monitor and improve their security measures. Penetration testing, commonly known as pen testing, is a crucial step in identifying vulnerabilities and weaknesses in an organization's systems, networks, and applications. One critical area that needs to be tested is the organization's Active Directory (AD). This article will discuss Active Directory pen testing, why it is essential, and some examples of AD vulnerabilities. What is Active Directory? Active Directory is a directory service developed by Microsoft for managing and organizing information about users, computers, and other resources in ... Read More
2K+ Views
Introduction Access networks are means by which internet service providers (ISPs) provide internet connectivity to their customers. They are final part of infrastructure that connects end-users to internet. Access networks can be wired or wireless and have different characteristics that make them suitable for different applications. Wired Access Networks Wired access networks are a type of computer network infrastructure that uses physical cables or wires to connect devices to internet or a local network. They are typically installed in buildings or homes to provide a stable and reliable connection to internet or other devices within network. Wired access networks have ... Read More
820 Views
In computer networking, access control lists (ACLs) are a vital tool used to control network traffic by granting or denying access to specific resources or services. Access lists are typically used on routers, switches, and firewalls to regulate traffic flow in and out of a network. This article will explore access control lists in greater detail, including their purpose, components, types, and examples. What are Access Control Lists (ACLs)? Access control lists (ACLs) are a set of rules that are used to control network traffic based on source or destination IP address, protocol, port number, or other criteria. ACLs are ... Read More
961 Views
In today's digital age, security of computer networks has become paramount. Computer networks are susceptible to a variety of security threats, ranging from unauthorized access to data breaches. To ensure security of computer networks, access control tactics play a crucial role. Access control is process of restricting access to resources in a computer network. This article explores access control tactics in computer networks, including their types and examples. Types of Access Control Tactics Access control tactics can be broadly classified into two types − physical access control and logical access control. Physical Access Control Physical access control is a security ... Read More
6K+ Views
Introduction With rapid advancement of technology and growth of internet, network security has become an increasingly important issue. Organizations and individuals alike are constantly at risk of cyber-attacks, and consequences of a successful attack can be devastating. In this article, we will discuss a model for network security that can be used by organizations to protect their networks. Understanding Threat Landscape Before implementing a network security model, it is important to understand threat landscape. Cyber attackers can use a variety of techniques to compromise a network, including − Malware Malware is malicious software that is designed to damage, disrupt ... Read More
1K+ Views
Introduction When it comes to gaming monitors, one of key specifications that is often discussed is refresh rate. A monitor's refresh rate determines how many times per second screen is updated with new information. two most popular refresh rates are 60 Hz and 144 Hz. While many gamers swear by benefits of a 144 Hz monitor, others argue that difference is negligible. In this article, we will explore differences between 60 Hz and 144 Hz and help you decide which one is right for you. What is Refresh Rate? Before we delve deeper into topic, let's first understand what refresh ... Read More
1K+ Views
Introduction Computer networking is a critical aspect of modern technology. In today's connected world, almost every organization relies on networking to share data and resources. Networking involves connection of multiple devices, such as computers, servers, printers, and other hardware devices, to facilitate communication and data transfer. Aspiring network engineers and IT professionals must have a solid understanding of principles and practices of computer networking to build and maintain efficient network infrastructures. In this article, we'll review six best books to learn computer networking. "Computer Networking: A Top-Down Approach" by James F. Kurose and Keith W. Ross "Computer Networking: A Top-Down ... Read More
6K+ Views
The Internet of Things (IoT) has emerged as one of most transformative technological innovations of modern era, enabling interconnectivity of devices and machines that we use in our daily lives. IoT has revolutionized way we interact with technology and world around us, paving way for new business models, improved efficiency, and greater convenience. To enable interconnectivity of devices and machines, a robust and scalable architecture is necessary. 5-layer architecture of IoT is a widely accepted framework that provides a structured approach to IoT system design and implementation. In this article, we will explore 5-layer architecture of IoT, its sub-headings, and ... Read More
998 Views
Introduction Mobile communication technology has undergone significant advancements in recent years, and 4G mobile communication technology is one such example. 4G or Fourth-generation mobile communication technology is most recent and advanced version of mobile communication network that provides better speed, capacity, and coverage than its predecessors. It was first introduced in 2010 and quickly gained popularity worldwide due to its high-speed internet connectivity and better user experience. In this article, we will discuss features, benefits, and limitations of 4G mobile communication technology. Features of 4G Mobile Communication Technology The following are key features of 4G mobile communication technology − High-Speed ... Read More
501 Views
Introduction As world continues to grow more digital, need for secure and robust authentication systems becomes increasingly important. Passwords have been traditional method of authentication, but with rise of hacking and other cyber crimes, new authentication methods are needed. One such method is 3D passwords, an advanced authentication system that combines multiple factors for enhanced security. This article will explore concept of 3D passwords, its advantages and disadvantages, and some examples of their usage. What are 3D Passwords? 3D passwords are a new type of authentication system that adds an extra layer of security to traditional password-based systems. They are ... Read More