Pranavnath has Published 389 Articles

Video Conferencing Protocols

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:31:16

3K+ Views

Video Conferencing is an innovative technology that has been developed to communicate with people anywhere around the world using audio and visual communication. It is possible with a good internet connection on PC, laptops, tablets, or smartphones. This visual communication between people allows sharing of information in terms of audio, ... Read More

Types of Network Protocols and Their Uses

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:29:19

2K+ Views

The world of communication has become possible, popular, and accessible now, because of the ability to share data resources between two devices that may be physically located at a longer distance, but are connected via the same network or the Internet. Network Protocol provides a certain set of rules that ... Read More

Understanding Web Authentication behind the login screen

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:27:39

772 Views

Web Authentication is verifying the user login details in any of the online accounts like an e-commerce website, social media, online banking services, etc. Each time when a user creates an online account in any of the web applications, a unique Id and key value will be created for future ... Read More

Traditional TCP

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:26:56

7K+ Views

In this article, we will understand the concept of the Traditional TCP. It is a wired network connection for communication. The Open System Interconnection (OSI) model has seven layers that include the functions of communication over any network. The OSI is considered one of the standard models for much network ... Read More

Trusted Systems in Network Security

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:24:16

5K+ Views

The term “Trusted system” means that it provides the user with an assurance that no malicious or harmful software affects the computer system. Network Security plays a vital role in many organizations, to keep the data safe and secure from being attacked by cyberattacks or malware. Now Companies are using ... Read More

Transmission mode

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:22:31

7K+ Views

Communication is defined as the transfer or sharing of data between any two individuals through a medium and the medium can be wired or wireless. In a computer network, the OSI (Open System Interconnection) model has seven layers for the communication networks. The First layer of OSI is the Physical ... Read More

Types of Viruses

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:17:24

9K+ Views

The Virus is a type of code that enters the system along with any file or programs and carries out malfunctions in the system. The virus-affected program will be a replica of the existing program. They enter the system through any file and when the file runs, parallelly the virus ... Read More

Trojan horse and Trap Door

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:12:31

4K+ Views

A threat is designed by hijackers to change the behavior of the process. The threat can reach the system through any path to our system or any organization sever. When the attack happens, it leads to the corruption of data, the stealing of personal information, and the loss of data. ... Read More

Top 10 Common Security Log Sources

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:07:24

1K+ Views

In this article, we will see the top 10 common security log sources that are being developed and used by companies. Log Sources are a type of data source that creates an event log in an organization. The log is nothing but the records with data. An event log is ... Read More

Advertisements