Introduction of Firewall in Computer Network
A firewall is a network security device that prevents unauthorized access to a network. It monitors both incoming and outgoing traffic using a predefined set of security to detect and prevent threats....
read more
Ping in C
Prerequisites: ICMP | Raw Socket | Internet Checksum | DNS Ping is a necessity for debugging the Internet. Ping is a basic Internet tool that allows a user to verify that a particular IP address exists and can accept requests., with other facilities....
read more
Maximum length of a URL in different browsers
In this article, we will discuss the overview of URL and Browser with examples of both of them. And finally will conclude with the Maximum length of a URL in different browsers. Let’s discuss it one by one....
read more
Introduction to Netcat
Netcat or NC is a utility tool that uses TCP and UDP connections to read and write in a network. It can be used for both attacking and security. In the case of attacking. It helps us to debug the network along with investigating it. It runs on all operating systems....
read more
RESTful Web Services
REST or Representational State Transfer is an architectural style that can be applied to web services to create and enhance properties like performance, scalability, and modifiability. RESTful web services are generally highly scalable, light, and maintainable and are used to create APIs for web-based applications. It exposes API from an application in a secure and stateless manner to the client. The protocol for REST is HTTP. In this architecture style, clients and servers use a standardized interface and protocol to exchange representation of resources....
read more
Types of Email Attacks
Many people rely on the Internet for many of their professional, social, and personal activities. But there are also people who attempt to damage our Internet-connected computers, violate our privacy and render inoperable Internet services. Email is a universal service used by over a billion people worldwide. As one of the most popular services, email has become a major vulnerability to users and organizations....
read more
Difference between OneDrive and iCloud
1. OneDrive : OneDrive or Microsoft OneDrive is a file hosting and synchronization service provided by the Microsoft. It gives the convenience to users for storing files, personal data and for sharing files. It offers 5 GB free storage space. It was launched by Microsoft in 2007. It is mostly used by professional workers to store the data related to work which might need more security....
read more
Web Scripting and its Types
The process of creating and embedding scripts in a web page is known as web-scripting. A script or a computer-script is a list of commands that are embedded in a web-page normally and are interpreted and executed by a certain program or scripting engine....
read more
Web Pages
A webpage is a digital document that is linked to the World Wide Web and viewable by anyone connected to the internet having a web browser. It can contain any type of information, such as text, color, graphics, animations, videos, sounds, etc....
read more
Network News Transfer Protocol (NNTP)
Network News Transfer Protocol (NNTP) is the underlying protocol of UseNet, which is a worldwide discussion system which contains posts or articles which are known as news. Network News Transfer Protocol is used to transfer news from one network to another. It is designed specifically to transfer news/articles. A NNTP client is included in browsers like Netscape, Opera and Internet Explorer or a special application named newsreader can be used as a NNTP client. NNTP servers manages the global network of news groups....
read more
InterPlanetary File System
Introduction: IPFS (InterPlanetary File System) is a peer to peer, version controlled, content-addressed file system. It makes use of Computer Science concepts like Distributed Hash Table, BitSwap (Inspired by BitTorrent), MerkleDag (Inspired by The Git Protocol)....
read more
Understanding Web Authentication behind the login screen
Authentication is the process of verifying the identity of a user or information. User authentication is the process of verifying the identity of the user when that user logs in to a computer system....
read more