Showing posts with label Networking. Show all posts
Showing posts with label Networking. Show all posts

Useful Linux web sites

 Linux Features   It allows many users to access a computer system at the same time. It supports the creation, modification, and destruction of programs, processes, and files. It provides a directory hierarchy that gives a location to processes and files.  It shares CPUs, memory, and disk space in a fair and efficient manner between competing processes. It allows processes and peripherals to talk to each other, even if they're...

Securing FTP-How

 Securing FTP You can make your FTP uploads and downloads more secure in one of two ways: through Secure File Transfer Protocol SFTP or Transport Layer Security TLS. SFTPSFTP is a more secure way of uploading and downloading files than FTP. When you use FTP, data is sent unencrypted, so someone who intercepts the data can easily read it. SFTP encrypts the commands and the data to provide a much more secure form of transport. To use SFTP (also...

Session Hijacking-Protection

Session hijacking isn't new to computer security. The term is most commonly used to describe the process of a TCP connection taken over by a sequence prediction attack. In such an attack, the attacker gains control of an already established TCP connection. When applied to Web application security, session hijacking refers to the takeover of a Web application session. HTTP is a stateless protocol with its origins in information dissemination....

E-Mail Security

When an e-mail message is sent between two distant sites, it will generally transit dozens of machines on the way. Any of these can read and record the message for future use. In practice, privacy is nonexistent, despite what many people think. Nevertheless, many people would like to be able to send e-mail that can be read by the intended recipient and no one else: not their boss and not even their government. This desire has stimulated several people and groups to apply the cryptographic principles we studied earlier to e-mail to produce...

Digital Signatures

The authenticity of many legal, financial, and other documents is determined by the presence or absence of an authorized handwritten signature. And photocopies do not count. For computerized message systems to replace the physical transport of paper and ink documents, a method must be found to allow documents to be signed in an unforgeable way. The problem of devising a replacement for handwritten signatures is a difficult one. Basically, what is needed is a system by which one party can send a signed message to another party in such a...

Network Security

For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially massive problem. In this...

What Is IP Filtering?

IP filtering is simply a mechanism that decides which types of IP packets will be processed normally and which will be dropped or rejected. By dropped we mean that the packet is deleted and completely ignored, as if it had never been received. By rejected we mean that the firewall sends an ICMP response to the sender indicating a reason why the packet was rejected. You can apply many different sorts of criteria to determine which packets you wish to filter. Some examples of these are: Protocol type: TCP, UDP, ICMP, etc. Port number...

TCP/IP Network Addresses-hosting

This kind of address is still in wide use and is what people commonly refer to as an IP address. Part of an IP address is used for the network address, and the other part is used to identify a particular interface on a host in that network. You should realize that IP addresses are assigned to interfaces-such as Ethernet cards or modems-and not to the host computer. Usually a computer has only one interface and is accessed using only that...

What is TCP/IP

Best seo practices How to promoting webpages Top seo tips top 10 e-commerce tips Additional seo tips Advanced seo tips Mobile seo tips What is TCP/IP The Transmission Control Protocol and the Internet Protocol manage the sending and receiving of messages as packets over the Internet. The two protocols together provide a service to applications that use the Internet: communication through a network. The World Wide Web is a network application that uses the services of TCP and IP to communicate over the Internet. When...

Network Topologies - Basic

In the seemingly never-ending competition to maximize theamount of data that can be pushed through a piece of wire, numerous network topologies have been tried and tested. Initially,companies offered wholesale solutions for customers wanting toutilize various software packages. The problem was that these solutions typically required certain network protocols and certainhardware be in place before anything would work. This was oftenreferred to as “monolithic” networking because these solutionswere rarely interoperable with other applications...

Network Security Configuration

Installed your Linux system, you should keep some basic security measures to protect your system Firewalls, intrusion protection, encryption, data integrity, and authentication are ways of protecting against such attacks. A firewall prevents any direct unauthorized attempts at access. Intrusion detection checks the state of your system files to see if they have been tampered with by someone who has broken in. Encryption protects transmissions by authorized remote users, providing privacy. Integrity checks such as modification...

Interview Questions-Networking

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 ...