Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by Pranavnath
389 articles
Cyber System Security
The Cyber System generally means the word related to a group of computers or Information Technology. Cyber security means the security of cyber systems. It provides a wide range of functions namely Information Technology, Networking, Computer systems, and mainly cyber security operations. Cyber System Security secures the computer system from cyber-attacks. It protects the system and the personal data, credentials, and passwords. Due to the developments in technology, the risks, and the cost to retain the services becoming higher. Cyber System A system that utilizes cyberspace is referred to as a cyber system. Information infrastructures, as well as individuals ...
Read MoreCyber Security- Attacking through Command and Control
Cyber security means the security of cyber systems. Cyber Security secures the computer system from cyber attacks. It protects the system and the personal data, credentials, and passwords. Due to the developments in technology, the risks and the cost to retain the services are becoming higher. Over the decade cyber attacks have raised a lot and one of the most endangered attacks is the Command and Control Attack which is done using Domain Name System (DNS). It is also referred to as C&C or C2 Attack. When an Organization is under this attack, it’s very crucial to get back to ...
Read MoreWhat is SNORT?
In the area of cybersecurity, the requirement for robust and effective intrusion detection and prevention systems is critical. SNORT, a network intrusion detection and prevention system that is free and open-source, is one of the most well-known and commonly used systems in this area. Snort, which also notifies system administrators of potential security concerns. Martin Roesch created it for the first time in 1998, and since then it has grown to be one of the most popular network security tools worldwide. What is SNORT? The initial version of SNORT, an open-source network intrusion detection and prevention system, was made available ...
Read MoreExplain the 3’A of open source security
Introduction In the realm of cybersecurity, the standards of open source security have risen as directing signals for organizations endeavoring to protect their computerized scenes. Open source security rises above the limits of restrictive arrangements, emphasizing collaboration, straightforwardness, and shared duty. Central to this worldview are the three A's of open source security: Adopt, Act, and Assess. These three principles encapsulate a comprehensive approach to invigorating computerized guards, guaranteeing a proactive position against advancing dangers. In this article, we delve into the importance of the three A's, exploring their focal points, needs, disadvantages, application challenges, and overarching significance within the ...
Read MoreProgress of a Process
In an operating system, the Process involves changing from one state to another state according to the specific condition such as the CPU, Input/output devices, and the user. There are some states available in the operating system such as new, waiting, ready, running, suspend ready or suspend wait. Progress can be seen through these process states to reach the destination. Progress of a process is one of the solutions to the critical section problem. The critical section affects the progress of a process when multiple processes are allowed in a system. Progress of a Process in the Operating System A ...
Read MoreProtection in File System
The file system is defined as the process of storing the user’s data in the computer operating system. This data can be stored in primary memory or secondary memory devices to store and retrieve information. The File is represented in terms of bits, bytes, or any records that can be defined by the author of the file. Each file has a logical address or location which is used for storing and retrieval process. Without the use of an organized hierarchy in file directories, selecting an individual file that is isolated is a tedious task from the user's end. File system ...
Read MorePuppy Linux Operating System
Puppy Linux is a version of the Linux operating system which is created for small, portable, and versatile usage for home user systems. It has been developed by Barry Kauler in the year June 2003. The complete package of the system can be operated with 300MB for 32-bit and 600MB for 64-bit operating systems. Initially, it was developed to support minimum storage to run all the Linux configurations and later it contains all the standard user applications with inbuilt ISO downloaded to the system. Puppy OS takes size as the major factor to provide hardware and memory support to personal ...
Read MoreProtection in OS: Domain of Protection, Association, Authentication
The Operating system manages various application programs that are loaded into the memory after booting the system. The operating system offers security methods to protect the process from other processes and unauthorized access from outside resources manages the resources from both logical and physical address spaces which include CPU, internal memory, or disk area. Protection mechanisms should be provided for these resources to assure confidentiality and integrity factors. Users can directly access the applications in the operating system with the help of a Graphical user Interface or a Command Line Interface. Protection in OS When multiple users access resources ...
Read MoreProtection ring
The operating system functions on different layers and each of them has its privileges. These privileges are mentioned using a protection ring that is used for sharing resources and the hardware systems, that manage the resources stored in the computer system like CPU processing time and memory access time. Protection rings are arranged in a hierarchical order from most trusted to least trusted privilege. The central ring at the kernel level can access all resources and has the highest privilege whereas the subsequent layers have a lesser level of access permissions. This mechanism is hardware imposed by the architecture of ...
Read MoreRequirements of Linux System Administrator
Linux is a type of operating system that is used in many computers that acts as a common platform between hardware and software applications. It is not only implemented in computers but also in mobile phones, laptops, and tab. Linux OS can be installed and used for free as it comes under Open source. The Linux System Administrator is a position in Information Technology (IT) companies in the backend to maintain and install the Linux operating system in different computers for the workflow of the respective organization. So certain requirements of the Linux System administrator are needed and are discussed ...
Read More