Pranavnath has Published 448 Articles

What is Remote Code Execution (RCE) ?

Pranavnath

Pranavnath

Updated on 12-Apr-2023 15:55:39

172 Views

Remote code execution(RCE) is an arbitrary code running on a remote system using security vulnerability and connecting it to a private or public network. Physical access is not required. The RCE can have severe consequences of Malware, loss of data, Service disruption, and ransomware deployment. The RCE vulnerability is exploited ... Read More

Vegas A (Modified TCP-Vegas)

Pranavnath

Pranavnath

Updated on 12-Apr-2023 15:54:41

168 Views

TCP Vegas is a modified TCP Vegas. It depends on Round Trip Time values on the accurate calculation of Base RTT. The TCP detects congestion that can be avoided at different Stages based on Round Trip Time(RTT). Here A stands for Adaptive. TCP Vegas emphasizes packet delay rather than loss ... Read More

Unknown Facts Of Networking

Pranavnath

Pranavnath

Updated on 12-Apr-2023 15:53:38

1K+ Views

Networking is the procedure to connect various devices and systems, allowing communication and exchange of information. It has become now a necessary aspect of our day-today lives, with the internet and other networked technologies opening us to work and learn to socialize on a global scale. Yet despite its presence ... Read More

Types of VoIP hacking and counter measures

Pranavnath

Pranavnath

Updated on 12-Apr-2023 15:52:06

379 Views

Voice over internet protocol is related to the collection of different technology that allows the easy and effective delivery of voice communication, video, audio, and images with the help of the data network through internet protocol. It can also be referred to as a technology that makes it very easier ... Read More

Types Of Spanning Tree Protocol (STP)

Pranavnath

Pranavnath

Updated on 12-Apr-2023 15:51:08

765 Views

STP is one type of network in the computer science field. It is 2 network layer protocol that is used to obstruct problems that appear while computers contest to use shared telecommunications paths through a local area network. A similar segment is ascenders for another segment and affords accordingly, network ... Read More

Types Of Memory On A Cisco Device

Pranavnath

Pranavnath

Updated on 12-Apr-2023 15:49:51

1K+ Views

Cisco provides products and services to help in building computer networks, including switches, routers, and software at individual and business scales. All the networking hardware, operating systems, and routers use different types of memory and it is determined by what functions the memory serves in the system. For example, a ... Read More

Type-C Port in Computer Network

Pranavnath

Pranavnath

Updated on 12-Apr-2023 15:48:54

129 Views

The Type-C Port is a new connection device for the power supply and also for the movement of data between electronic devices. It is also known as a USB-C port. It is an upgraded version of the preceding USB connectors. It is commonly used in mobile phones, the newest laptops, ... Read More

Transparency of RPC in Distributed Networks

Pranavnath

Pranavnath

Updated on 12-Apr-2023 15:47:06

884 Views

In this article, we will study the Transparency of RPC in distributed Networks. Communication between different nodes is essential in a distributed network to achieve the desired functionality. RPC also called a Remote Procedure Call allows communication between different nodes or systems. RPC can be termed as a protocol that ... Read More

Why HTTP is not secure?

Pranavnath

Pranavnath

Updated on 11-Apr-2023 17:32:24

928 Views

HTTP stands for Hypertext Transfer Protocol. Protocol is a set of rules that tells what is the correct procedure to be followed in normal situations while sharing data in networking. HTTP is a type of standard language or one kind of application protocol for transferring hypermedia documents such as HTML ... Read More

What is SNORT?

Pranavnath

Pranavnath

Updated on 11-Apr-2023 17:31:53

748 Views

In the area of cybersecurity, the requirement for robust and effective intrusion detection and prevention systems is critical. SNORT, a network intrusion detection and prevention system that is free and open-source, is one of the most well-known and commonly used systems in this area. Snort, which also notifies system administrators ... Read More

Advertisements