Skip to main content

Posts

Showing posts from May, 2019

Firewall

Firewall protects the network from external threats using variety of methods. A firewall a network security system which monitors incoming & outgoing traffic & decides whether to allow or deny traffic based on the security rules. Methods of Firewall. Port Filtering MAC Filtering IP Filtering Content Filtering Dynamic Filtering

Intranet

An intranet is a secure private network contained within an enterprise. It usually consists many interconnected local area networks & use leased lines (A leased line is private bidirectional communication channel between two or more locations)in the WAN. Generally intranet uses TCP/IP,Https,ssl,Tls & other internet protocols.It's actually a private version of the internet. Using port forwarding (transmission of data intended for private use only) companies can send private messages through the public network with strong Encryption/Decryption methods.

32 Bit Vs 64 Bit

Normally a computer hardware or software could come with 32 or 64 bit versions. The main difference of these versions is the way they handles the memory. The 32 Bit processor could support maximum of 4 GB RAM  whereas the 64 bit processor could support. 32 bit is 2 to the power of 32,which is equal to 4 Gigabytes 64 bit is 2 to the power of 64,which is equal to 16 Exabytes The   64 bit memory is 4 billion times more than the 32 bit, which is very huge & virtually this amount of memory could be considered as Virtually unlimited. The Ram of   32 bit supports only 4 GB memory,so any program above that capacity have to constantly get data from hard disk,which would make the computer slower. The Ram of 64 bit supports a huge memory than 32  bit,so the processes of a computer would be very higher than 32 bit.

CORE I 3 || I 5 || I 7

CORE I 3 < CORE I 5 < CORE I 7 The above line simply explains the power of cores. The numbers indicates the processing power based on certain criteria s. Number of Cores Turbo Boost / Hyper threading Cache Capacity Clock Speed More cores means more tasks could be managed simultaneously. Core I 3 has TWO cores & hyper threading.it consist with 3 to 4 MB cache memory. This doesn't have the Turbo Boost technology (This is used to increase clock speed of a computer) . Core I 3 would be ideal for soft users & it uses the battery very efficiently.Also, it's cheaper than the others. Core I 5 usually comes with dual core or quad core & the cache memory would be 4 to 6 MB.This also have he Turbo Boost Technology,which is used to automatically raise the processor's operating frequency.But this doesn't have hyper threading technology. This would be ideal for Photo editors,programmers,web developers . Core I 7  comes with FOUR ...

Motivation Pic Of the Day

Microsoft Exchange

Microsoft Exchange Exchange server enable the business user's to securely access emails from various devices. Microsoft Exchange server 2019 is the latest version. Methods used by the Exchange Account to access Email on the Server Exchange ActiveSync; MAPI/HTTP This method is widely used by laptop,phone & tablet .This method will not download or store the email in the device when accessing the email.instead it will be accessed directly from the exchange server.This will allow us to access our email even in offline mode. IMAP This also helps to access the email from any device from anywhere & it will synchronize all the email folders between device & the server. POP This method downloads the email from the server to the device .Once the email is downloaded to the device,it will be deleted from the mail server.We will have to use the same device to access downloaded emails. Email Cache The exchange email account provides the functionality to acces...

Active Directory , Domain

Active Directory Active directory is a service created by Microsoft for the Domain Networks. This service is to manage permissions & access to to networked resources. Active Directory Domain services (AD DS) is one of the main service , which stores directory information & manages the interaction between user & domain. Ad has user accounts, host names & group policies.user accounts are used to login to computers will be connected to this domain. The group policies used to apply different access & permissions to all the computers or users are on this domain. What is a Domain ? Domain is computer network that has user accounts, group policies,computers & printers. All the computers on a network connected to a domain which we used to login to & it considered as the centralized location for each component. In the terms of networking, a domain has user group, devices, workstations, printers,database servers & computers that share various ...

E-Mail Protocols

SMTP - Simple mail Transfer Protocol This protocol is used to send emails. The Ports used by this protocol are 25,465,587 IMAP/POP 3 These protocols are used for retrieving emails from an Email Server. POP 3 - Post Office Protocol 3 The POP 3 will download the email to our device from a mail server. It will only downloads the inbox folder & won't download or synchronize with other folders. Also, once the email is downloaded same will be deleted from the mail server.so , there's no any other copies available. IMAP  - Internet Message Access Protocol This protocol allows us to view our emails using multiple devices. IMAP caches local copies of the email onto all of our device & synchronizes all the email folders. But, when an email is deleted from a device, same will be deleted in all the other devices.

DHCP

DHCP Dynamic Host Configuration Protocol is used assign IP addresses to the devices to enter to a Network.This configuration will be done automatically without manual involvement. The early stage of networking,the user had the ability to manually assign IP addresses to their devices.But the modern world cannot work like that due to the no of devices in play. So DHCP automates this process to make it easier & quicker . The DHCP servers or routers handle this process according to set of predefined rules. Usually the router act as a DHCP server in homes & in some small business.But in large network a computer will act as a DHCP server. The DHCP Server automatically assigns the below to a device. IP Address Subnet Mask Default Gateway DNS Server

Http,Https,ssl,tls

HTTP Hypertext transfer protocol is used to view the webpages on the internet. All information exchanged through this protocol are sent in Clear text (name,Address,ssn,Card no,password )through a public network Which is very vulnerable to whoever (Hackers) wants to access the personal information. HTTPS Secure hypertext transfer protocol.This is the secure version of HTTP. This protocol encrypts the data shared between the browser & server. SSL Secure   Sockets Layer is the standard security technology for establishing an encrypted link between  a browser & server. Usually SSL is used for logins,financial transactions & other authentications.But currently its being used by many websites.Also, google degrade the rank of non secure sites to exercise secure browsing. An SSL Certificate is used to authenticate the identity of a website.(To check whether the site is secure or not) SSL Version 3.0 is the latest version of SSL. TLS Transport...