Ayushi Bhargava

Ayushi Bhargava

127 Articles Published

Articles by Ayushi Bhargava

127 articles

Types of Email Attacks

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 2K+ Views

Electronic mail (email) is a digital messaging system that allows users to send and receive messages via the Internet. Email communications are sent and received by email servers, available from all Internet Service Providers (ISP). Emails are transmitted between two separate server folders: the sender's and the recipient's. A sender saves, transmits, or forwards email messages, whereas a recipient accesses an email server to view or download emails. Unfortunately, cybercriminals exploit email systems to launch various attacks against vulnerable users. Understanding these attack types is crucial for maintaining cybersecurity awareness and protection. Types of Email Attacks ...

Read More

What is Tunnelling in Computer Networks?

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 21K+ Views

Tunnelling is a protocol for transferring data securely from one network to another. Using a method known as encapsulation, tunnelling allows private network communications to be sent across a public network, such as the Internet. Encapsulation enables data packets to appear as general traffic to a public network when they actually contain private data, allowing them to pass unnoticed. Note − Port forwarding is sometimes referred to as a form of tunnelling, though they are technically different concepts. Tunnelling Process Overview Private Data Encapsulation ...

Read More

Types and Uses of Backbone Networks

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 5K+ Views

A backbone network is the central infrastructure component that interconnects multiple networks and provides a high-capacity pathway for data transmission between them. It serves as the primary conduit connecting different local area networks (LANs) within buildings, campuses, or across larger geographical areas to form wide area networks (WANs) or metropolitan area networks (MANs). The backbone network acts as a data superhighway, utilizing various transmission media including optical fiber, copper cables, and wireless technologies such as microwave links and satellite connections. A key characteristic of backbone networks is that their capacity must exceed that of the individual networks they support ...

Read More

What is Vishing (Voice Phishing)?

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 344 Views

Vishing (voice phishing) is a type of social engineering attack that uses telephony, typically Voice over IP (VoIP) technology, to deceive victims into revealing sensitive personal or financial information over the phone. Unlike traditional landline services that are tied to physical locations and bill-payers, modern VoIP technologies enable attackers to use caller ID spoofing and automated systems to evade detection. Criminals exploit these technologies to steal credit card numbers, banking credentials, and personal information for identity theft purposes. How Vishing Works Attacker ...

Read More

Working and Types of Smart Card

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 1K+ Views

A smart card is a compact microprocessor-based device the size of a credit card that stores and processes data. Smart cards have largely replaced conventional magnetic stripe cards since they can store significantly more data and perform complex functions. Smart cards are now used in various industries, including banking, public transportation, healthcare, and security systems. Smart card manufacturers use advanced technologies such as electron beam lithography to embed small circuits and microprocessors on a printed card. As data storage technology progresses, manufacturers continue to increase the functionality of smart cards by working with nanoscale components. The solid-state design ...

Read More

Working of Different layers in Computer Network

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 465 Views

Have you ever wondered how different layers of the network work together to send messages? Before going into details, let us first understand some basic terms. Address Resolution Protocol (ARP) request is a protocol that converts IP addresses to MAC addresses. A routing table is a set of rules, usually displayed in tabular format, used to determine the routing location of data packets transmitted over an Internet Protocol (IP) network. In a typical network, the host device has all the layers of the OSI model, while routers typically operate at the network, ...

Read More

What is a Wireless Local Loop (WLL)?

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 14K+ Views

A Wireless Local Loop (WLL) is an access system that connects users to the local telephone company's switch using wireless links instead of traditional copper cables. Also known as fixed wireless access (FWA) or fixed radio, this technology provides telephone, facsimile, and data services to business and residential subscribers using analog or digital radio technology. WLL systems enable rapid deployment of basic phone service in areas where geography or telecommunications development makes traditional wireline service prohibitively expensive. They integrate easily with the public switched telephone network (PSTN) and can typically be installed within a month, much faster than traditional ...

Read More

What is E-Governance?

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 3K+ Views

E-governance refers to the application of information and communication technologies (ICT) to government processes and functions to achieve efficient, ethical, accountable, and transparent governance. It encompasses the digital transformation of government services, enabling electronic interactions between government entities and various stakeholders including citizens, businesses, and employees. Through comprehensive multi-stakeholder approaches, e-governance facilitates seamless electronic interactions, streamlining communication between government and non-governmental organizations while improving service delivery to the public. E-Governance Ecosystem Government Digital Services Citizens Business ...

Read More

XMODEM File Transfer Protocol

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 2K+ Views

XMODEM is a standard file transfer protocol developed by Ward Christensen in 1977. It is a half-duplex communication protocol that sends data in blocks and waits for acknowledgment before transmitting the next block. XMODEM includes effective error detection mechanisms and is widely used in both hardware and software implementations. The protocol organizes file data into packets sent sequentially to the recipient, along with control information that allows the receiver to verify packet integrity. Files are padded with known characters to fill the final block, and file transfer completion is signaled with an end-of-file character. ...

Read More

Web Caching and Conditional GET Statements

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 2K+ Views

The activity of saving data for reuse, such as a copy of a web page supplied by a web server, is known as web caching. It is a fundamental technique used to improve web performance and reduce server load. Web caching works by storing frequently accessed content at intermediate locations closer to users. When a user first accesses a page, it is cached or saved, and subsequent requests for the same page are served from the cache rather than the origin server, preventing server overload and improving response times. How Web Caching Works Web caching techniques dramatically ...

Read More
Showing 1–10 of 127 articles
« Prev 1 2 3 4 5 13 Next »
Advertisements