Satish Kumar has Published 1042 Articles

Active Directory PenTesting

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 14:43:23

395 Views

In today's digital world, cyber attacks are becoming increasingly sophisticated, and organizations must continuously monitor and improve their security measures. Penetration testing, commonly known as pen testing, is a crucial step in identifying vulnerabilities and weaknesses in an organization's systems, networks, and applications. One critical area that needs to be ... Read More

Active and Passive attacks in Information Security

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 14:39:29

399 Views

Introduction Information security is an essential aspect of modern-day technology, and it's vital to understand various threats that can compromise sensitive data. Two of most common types of attacks that can occur are active and passive attacks. In this article, we'll explore differences between active and passive attacks, methods used ... Read More

Access Networks

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 14:34:42

306 Views

Introduction Access networks are means by which internet service providers (ISPs) provide internet connectivity to their customers. They are final part of infrastructure that connects end-users to internet. Access networks can be wired or wireless and have different characteristics that make them suitable for different applications. Wired Access Networks Wired ... Read More

Access Lists (ACL)

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 14:24:43

158 Views

In computer networking, access control lists (ACLs) are a vital tool used to control network traffic by granting or denying access to specific resources or services. Access lists are typically used on routers, switches, and firewalls to regulate traffic flow in and out of a network. This article will explore ... Read More

Access Control Tactics in Computer Networks

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 13:36:09

157 Views

In today's digital age, security of computer networks has become paramount. Computer networks are susceptible to a variety of security threats, ranging from unauthorized access to data breaches. To ensure security of computer networks, access control tactics play a crucial role. Access control is process of restricting access to resources ... Read More

Access and trunk ports

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 12:04:45

162 Views

Introduction In computer networking, a network switch is a device that connects network devices together to enable communication within a network. Switches are an essential component of any modern network, and they provide a way to manage network traffic by directing data to appropriate device. Access and trunk ports are ... Read More

A Model for Network Security

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 12:02:42

1K+ Views

Introduction With rapid advancement of technology and growth of internet, network security has become an increasingly important issue. Organizations and individuals alike are constantly at risk of cyber-attacks, and consequences of a successful attack can be devastating. In this article, we will discuss a model for network security that can ... Read More

A Cryptographic Introduction to Hashing and Hash Collisions

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 12:01:05

64 Views

Introduction Hashing is an essential aspect of modern cryptography. It is used to encrypt data in a secure and efficient way. Cryptographic hash functions are a type of mathematical function that takes data of any size and converts it into a fixed-size output, which is referred to as a hash. ... Read More

60 Hz vs 144 Hz Does it matter

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 11:59:35

216 Views

Introduction When it comes to gaming monitors, one of key specifications that is often discussed is refresh rate. A monitor's refresh rate determines how many times per second screen is updated with new information. two most popular refresh rates are 60 Hz and 144 Hz. While many gamers swear by ... Read More

6 Best Books to Learn Computer Networking

Satish Kumar

Satish Kumar

Updated on 27-Sep-2023 11:56:02

621 Views

Introduction Computer networking is a critical aspect of modern technology. In today's connected world, almost every organization relies on networking to share data and resources. Networking involves connection of multiple devices, such as computers, servers, printers, and other hardware devices, to facilitate communication and data transfer. Aspiring network engineers and ... Read More

Advertisements