Tuesday, August 24, 2010

What's BCC?

. Tuesday, August 24, 2010
0 comments

              In this electronic modern world, millions and millions of people are using Internet. One of main communicating way people use its by e-mails. Everyone sends lot e-mail personally and officially. Though people send huge amount of mails but very few only knows what's BCC.

           What is BCC - Blind Carbon Copy, everyone would have seen it while mailing to others. Most probably you can find BCC option just below TO. The main usage of BCC is used in bulk mailing.

Read More »»

IPv4 vs IPv6

.
0 comments

 The IP(Internet Protocol) was mainly used as identity for any device which is been used to access or communicate with it. The IP can be assigned to computers,routers,switches etc.. The main usage of internet protocol versions that are been implemented are IPv4(Internet Protocol version 4)  and IPv6(Internet Protocol version 6).




             The IPv4 been predominantly used in present internet world. But since IPv4 address are been getting drained off and no more new IP are there to assign for new device. The IPv4 consist of various classes from a to e. They are been build with 32bits address.

Read More »»

Sunday, August 22, 2010

Phishing

. Sunday, August 22, 2010
0 comments



Phishing is one of hacking technique to steal user name and password. Phishing is done by using fake page of any website which been connected with hackers database. The link of fake page been given to target person. He/She get cheated by thinking that its real site that they are been used with it.When they login into fake page user name and password get stored in hackers database.

Read More »»

DHCP - Dynamic Host Configuration Protocol

.
0 comments

The Dynamic Host Configuration Protocol (DHCP) is an auto configuration protocol used on IP Networks. This protocol is used to configure automatically IP address for both IP v4 and IP v6.

 

                     

Read More »»

RIP - Routing Information Protocol

.
0 comments




The RIP(Routing Information Protocol) is dynamic protocol. It is classified under IGP(Interior gateway protocol). It is one of very famous protocol used in application layer. The RIP consist of Ver1 and ver2 in it.

Read More »»

Spoofing

.
0 comments

Spoofing is one of technique or attack that been successfully done in order to gain illegal advantage. They are mainly used for masquerade people to justify falsifying data. Spoofing is consider to be key factor in network security people are concerned with. Spoofing are done by

                        

Men in Middle Attack:
               In Men in Middle Attack, while two client transfer information when intruder intrude and acts to be authorized user from one other by gaining all vital information.

Read More »»