Pranavnath has Published 443 Articles

Deep Web: The Dark Side of Internet

Pranavnath

Pranavnath

Updated on 11-Apr-2023 17:26:48

748 Views

Everything on the internet that is not classified by and so accessible through a search engine like Google is referred to as the deep web. And on the other side, the dark web is a section of the internet that is hidden from search engines and can only be accessed ... Read More

Details of DNS

Pranavnath

Pranavnath

Updated on 11-Apr-2023 17:25:48

2K+ Views

The Domain Name System (DNS) is a fundamental portion of the web that empowers clients to get to websites and other online assets utilizing space names instead of IP addresses. DNS is capable of interpreting human-readable space names into machine-readable IP addresses. This interpretation is basic since it permits clients ... Read More

Data Communication-Definition, components, Types, Channels?

Pranavnath

Pranavnath

Updated on 11-Apr-2023 17:24:12

11K+ Views

People use different languages as per the place they are living, language is used for communication purposes. Nowadays technology is improved a lot, communication became easy even though the distance between people is huge. People in one place may communicate easily with people who are in the other place using ... Read More

Data Communication Terminologies

Pranavnath

Pranavnath

Updated on 11-Apr-2023 17:23:27

2K+ Views

Different languages are used by different people based on the place they are located. language is used for communication purposes. Nowadays technology is improved a lot, communication became easy even though the distance between people is huge. People in one place may communicate easily with people who are in the ... Read More

Data Security in Computer Network

Pranavnath

Pranavnath

Updated on 11-Apr-2023 17:22:50

2K+ Views

Data security is the procedure to secure digital information from unauthorized access, theft, or corruption. The Data security is adhere to CIA Triad functioning i.e Confidentiality, Integrity, and Availability. Confidentiality is proper authorization by the legitimate user. Integrity is robust and unchangeable to attain accurate, reliable data. Availability is access ... Read More

What is QUAD9 Technology

Pranavnath

Pranavnath

Updated on 11-Apr-2023 17:22:01

452 Views

Quad9 protects users from malware, spyware, botnets, and other security threats. It enables this by providing a secure recursive public DNS resolver that users can set up in their devices, routers, and wifi endpoints as a DNS service for free. The Swiss-based not-for-profit Quad9 foundation provides the DNS service related ... Read More

Wireless Pentest Basics

Pranavnath

Pranavnath

Updated on 11-Apr-2023 17:21:04

611 Views

Wireless networks are getting to be an indispensable portion of our lives. They are utilized in homes, workplaces, open places, and indeed on the go. In any case, with the increment in utilization, there's also an increment in the potential for security breaches. A remote infiltration test (pentest) may be ... Read More

WiFi and its Amendments

Pranavnath

Pranavnath

Updated on 11-Apr-2023 17:20:16

362 Views

A technology called Wireless Fidelity (WiFi) enables wireless access to the internet and other networks. It has established itself as a standard in residences, workplaces, and public areas all across the world, offering millions of people ease and mobility. With the creation of modifications to the original WiFi standard, new ... Read More

Wide-Mouth Frog

Pranavnath

Pranavnath

Updated on 11-Apr-2023 17:11:35

461 Views

In computer science, a wide-mouth frog alludes to a sort of security danger where a noxious performing artist picks up unauthorized get to arrange by posturing as a trusted substance. This sort of assault is additionally known as "pantomime assault." The term "wide-mouth frog" comes from the thought that the ... Read More

Credit Cards Frauds

Pranavnath

Pranavnath

Updated on 11-Apr-2023 17:09:19

370 Views

Credit card extortion could be a wrongdoing that includes the unauthorized utilization of another person's credit card or credit card data to form a buy or pullback store. Delays in identifying and avoiding credit card extortion can have a critical effect on banks and clients. This article will talk about ... Read More

Advertisements