
TELNET and FTP both are the connection oriented and application layer protocols. Both creates a connection between remote host and a server. As name File Transfer Protocol, FTP is used for transferring the files from one system to another system... Read more

Forensics is a discipline that dates back at least to the Roman era (and possibly event to ancient China), when people accused of crimes (and the accuser) presented evidence in front of a public audience (the Latin word forensics, means... Read more

Encryption and decryption using a secret key To secretly communicate with Bob, Alice encrypts her messages before sending them. There are many techniques (cryptographic algorithms) that she can use. All these algorithms have in common that they can transform a... Read more

When using public key cryptography, Alice and Bob both have their own key pairs. A key pair consists of a public key and a private key. If the public key is used to encrypt something, then it can be decrypted... Read more

Cryptography is “Art of writing or hiding secret”. It is a science of protecting the information from theft or unauthorized access. To do so, important or confidential information is hided as or converted to some other form of gibberish data.... Read more

Search Engine Optimization is the complex thing yet the easiest to do to gain traffic and better ranking. Once you rank well in the search engines like Google/Bing, you will start seeing traffic trickling in your site. Search Engine Optimization... Read more

GitHub is where people build software. More than 83 million people use GitHub to discover, fork, and contribute to over 200 million projects. When GitHub was founded in 2008, its primary goal was to host Open Source projects using the... Read more

JavaScript is one of the world’s most popular programming language. JavaScript is a lightweight, interpreted, or just-in-time compiled programming language with first-class functions. While it is most well-known as the scripting language for Web pages, many non-browser environments also use... Read more

YouTube is packed with so much tech content it’s hard to know where to start. From tech-focused YouTubers to blockchainers, there’s virtually a video for everything you’re looking for. However, looking for the best YouTube channels for a topic you’re... Read more

User training is an essential part of any security endeavor. Not every worker in an organization is automatically an IT or technology expert, nor should you expect them to be. User training and security awareness aim at providing all users... Read more

GlobalProtect VPN is the system used to connect to the Virtual Private Network (VPN). A VPN provides an encrypted connection between your off-campus computer and the campus network. Users or Employees can use your VPN service at no cost to... Read more

Database management system is software that is used to manage the database. The database is a collection of inter-related data which is used to retrieve, insert and delete the data efficiently. It is also used to organize the data in... Read more