Posts

Showing posts with the label Network
Table of Contents: []

Countermeasures of the network

Image
 Countermeasures of the network A countermeasure is a system or technology that can prevent or mitigate the effects of a threat. Countermeasures such as firewalls and intrusion detection systems are implemented on devices that may be used in a variety of ways. For example, a firewall countermeasure can help prevent the exploitation of a vulnerability by an attacker. A firewall is an application-level security measure that separates clients from servers or network resources. For example, malware can be detected and prevented from running. Malicious software may also contain backdoors or other methods of bypassing security measures. Hardware countermeasures are a means of prevention; for example, if an attacker succeeds in executing code on your computer by exploiting a vulnerability in a piece of software on your device, you want to ensure that this does not happen again. Modes of conduct can take the form of behaviors such as changing passwords periodically and using only two-factor au
Table of Contents: []

Domain Name System | Learn Networking Concept

Image
The Domain Name System (DNS) Plays a Totally Important Role In Modern-day Networking.  The Domain Name System (DNS) plays a totally important position in modern-day networking. It's an unsung hero that permits us to use the internet in the best way possible. Without DNS, our connected lives might appear very extraordinary.  DNS will take our area name, and translate, or resolve it, into an IP address. Internet servers do now not paintings with domain names, so your laptop needs to translate this into an IP cope with.  The first factor it does is check its nearby cache both at the computer and the browser. There’s additionally a nearby configuration file that's checked. If there are no cache entries, your laptop will send a query to something called a DNS recursive resolver requesting the IP deal with of certbros.Com. Once the DNS resolver receives your question, it examines its cache. If it may locate an entry for certbros.Com, it's going to send a request to another server
Table of Contents: []

Cookie and Cache

Image
Browser Cookies, Internet Cookies, HTTP Cookies, Computer Cookies...  Cookies have many names. But WHAT THE HECK are they?! Well, sit tight and keep onto your knickers because in this video I answer the question, "What Are Cookies?" And give an explanation for How They Work! First off, a cookie is a small piece of facts from a selected website, this is saved on a consumer’s laptop at the same time as their surf the internet.  How cache & cookies work Cookies can be used to invade your privacy and track you around the internet. But what are cookies and how do they work? They were initially invented to make our lives easier and are used to keep us logged in and to store things like shopping carts and preferences on our computers instead of on servers. However, clever companies can use cookies to track us around the internet. It can help them to build a profile of users and sell more targeted advertisements.  How cookies can track Cookies are files created through sites you
Table of Contents: []

What is a network? - Learn Networking Concept

Image
What is a network? A network is a set of interconnected devices that allow devices to share resources and transfer data to other devices on or off the network. Network devices include hubs, bridges, routers, and switches. Network media includes copper, fiber optic cables, and wireless. A network uses many different types of protocols to exchange data (such as ethernet) To create a network we have to have a number of basic additives which include Network Devices Explained | Hub, Bridge, Router, Switch When we communicate about networks gadgets we may think approximately a group of computers connected together, however, a network also can include other items along with servers, printers, game consoles together with the ps4, mobile phones, and devices together with the amazon echo, also called a voice controlled intelligent personal assistant. generally speaking, we name those gadgets are referred to as “nodes” or “hosts”. Network Media The Network Media must be linked
Table of Contents: []

Fundamental of network and wireless Security?

Image
Fundamental of network and wireless Security It follows a big role in Ethical Hacking. You've must good understanding of networking that's What is Switch, Router, Hub, Modem?", "What is network topology? What is noces How do works LAN Loc? Area Network) WAN Wide area network MAN Metropolitan Area Network What is network Port?", "What is Internet protocol?" and also Fundamental of network and wireless Security and last all about NAT, DHCP, Subnetting, Public IP, Private IP, IPv4, IPv6, DNS, ARP, OSI model, MAC address. You must have a piece of Good knowledge of these things. a) What is Switch, Router, Hub, or Modem? b) What is network topology?
Table of Contents: []

How do works ( LAN/Local, WAN, MAN )

Image
How do works LAN/Local? ( Local Area Network) WAN (Wide area network ) MAN ( Metropolitan Area Network ). Types of connections in computer networks may be classified in step with their size in addition to their motive PAN is a computer network that commonly includes a computer, mobile, or private virtual assistant LAN (Local Area Network) is a collection of computer and peripheral gadgets that might be related in a confined vicinity
Table of Contents: []

what are Network Topologies and how it works in Computer Networks?

Image
Network Topologies and how it works in Computer Networks? Today we will see, network topology. Upon the completion of this session, we will be able to understand, various network topologies like bus, star, ring, mesh, and hybrid. We will also understand what are the advantages and disadvantages of bus, star, ring, mesh, and hybrid topologies. Firstly, we will start with what is a network topology. We have some nodes and we have to arrange these nodes so that we can establish communication among all the nodes. Topology: means the arrangement of nodes of a computer network. Say I have to arrange all these nodes so that I can establish communication among all the nodes. Topology can be viewed as a Layout of a computer network. Topology can be viewed as a physical topology and logical topology. Physical topology: means where I am going to place all these nodes. This is what is Physical topology. Say I can place all these three nodes on the ground floor of m



Tagline: streamlines online search, prioritizing user safety and simplifying the search process.