Home » Network

What is Botnet?

A botnet is a group of computers that are controlled from a single source and run related software programs and scripts. While botnets can be used for distributed computing purposes, such as a scientific processing, the term usually refers to multiple computers that have been infected with malicious software. In order to create a malicious botnet, a hacker must first compromise several computers. This might be done by exploiting a security hole through a Web browser, IRC chat program, or a computer's operating system. For example, if a user has turned ... Read more

What is a Hacker?

While this term originally referred to a clever or expert programmer, it is now more commonly used to refer to someone who can gain unauthorized access to other computers. A hacker can "hack" his or her way through the security levels of a computer system or network. This can be as simple as figuring out somebody else's password or as complex as writing a custom program to break another computer's security software. Hackers are the reason software manufacturers release periodic "security ... Read more

What is Denial of Service?

A denial of service attack is an effort to make one or more computer systems unavailable. It is typically targeted at web servers, but it can also be used on mail servers, name servers, and any other type of computer system. Denial of service (DoS) attacks may be initiated from a single machine, but they typically use many computers to carry out an attack. Since most servers have firewalls and other security software installed, it is easy to lock out individual systems. Therefore, distributed denial of service (DDoS) ... Read more

What is a CDN?

Stands for "Content Delivery Network." A CDN is a group of servers distributed in different locations. Small CDNs may be located within a single country, while large CDNs are spread across data centers around the world. CDNs are used to provide content to users in different locations as quickly as possible. For example, a user in San Francisco may receive website content from a server in Los Angeles, while a user in England may receive the same content from a server in London. This is accomplished ... Read more

What is File Compression?

File compression is used to reduce the file size of one or more files. When a file or a group of files is compressed, the resulting "archive" often takes up 50% to 90% less disk space than the original file(s). Common types of file compression include Zip, Gzip, RAR, StuffIt, and 7z compression. Each one of these compression methods uses a unique algorithm to compress the data. So how does a file compression utility actually compress data? While each compression algorithm is different, they all work in a similar fashion. ... Read more

What is Compression?

Compression, or "data compression," is used to reduce the size of one or more files. When a file is compressed, it takes up less disk space than an uncompressed version and can be transferred to other systems more quickly. Therefore, compression is often used to save disk space and reduce the time needed to transfer files over the Internet. There are two primary types of data compression: File CompressionMedia Compression File compression can be used to compress all types of data into a compressed archive. These ... Read more

What is the difference between CSMA/CA and CSMA/CD?

CSMA/CD:CSMA/CD stands for Carrier Sense Multiple Access / Collision Detection is a network protocol for carrier transmission. It is operated in the medium access control layer. It senses of the shared channel is busy for broadcasting and interrupt the broadcast until the channel is free. In CSMA/CD collision is detected by broadcast sensing from the other stations. Upon collision detection in CSMA/CD, the transmission is stopped and a jam signal is send by the stations and then station waits for a random time ... Read more

What is IPv6?

IP address is your digital identity. It’s a network address for your computer so the Internet knows where to send you emails, data, etc. IP address determines who and where you are in the network of billions of digital devices that are connected to the Internet. IPv6 or Internet Protocol Version 6 is a network layer protocol that allows communication to take place over the network. IPv6 was designed by Internet Engineering Task Force (IETF) in December 1998 with the purpose of superseding ... Read more

What is Difference between Kerberos and SSL?

1. Kerberos :Kerberos is a computer-network authentication system which is used for the authentication of users information while logging into the system. Kerberos is based on symmetric key cryptography and depends on a reliable third party and works on the private key encryption during phases of authentication. Different versions of Kerberos are developed for enhancing security in the authentication. Kerberos is generally implemented in Microsoft products like Windows 2000, Windows XP and later windows. 2. Secure Socket Layer (SSL) :SSL is an encryption protocol which gives secure transmission ... Read more

What is Cloud Computing?

Cloud computing refers to applications and services offered over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud." This metaphor represents the intangible, yet universal nature of the Internet. The idea of the "cloud" simplifies the many network connections and computer systems involved in online services. In fact, many network diagrams use the image of a cloud to represent the Internet. This symbolizes the Internet's broad reach, while simplifying its complexity. Any user with ... Read more
Next Page »
Free Thumbnails by PagePeeker