Posts

Showing posts with the label security

What is an IP address?

 Every device connected to the internet is given a specific numerical identity called an IP address, or Internet Protocol address.  Determining the network and position of each device, enables the communication between devices over the internet.  In other words, your IP address serves as the equivalent of a physical address for your device online. What is an IP address used for? Your Internet Service Provider assigns your device an IP address when you connect to the internet (ISP). To and from your device, internet traffic is forwarded using this IP address.  Your IP address is transmitted every time you visit a website, enabling it to deliver the requested data back to your device. How can I locate my IP address? It's simple to find your IP address. Several methods exist, depending on the device you're using. A Windows computer: 1. Type "cmd" into the search box after clicking the Start button. 2. To launch the Command Prompt, press Enter. 3. Ipconfig is entered afte

What is Data Base ?

Database :  Database system Is basically a Computer-based Record keeping system. The collection of data ,usually referred to as the database, contain information about one particular Enterprise. It maintains any information that may be necessary to the decision making process involved in the management of that organisation. A database may also be defined as the collection of interrelated data stored together to serve multiple applications. The intention of a database is that the same Collection of data should serve as many applications as possible. Hence, a database in often conceived of as the repository of information needed for running certain functions in corporations or an organisations. Such a database would Permit not only the retrieval of data but also the continuous modification of data needed for control of operation. It may be possible to search the database to obtain answer to queries or information for planning purpose. Database Purpose: A database management system is ans

What Is IPv6 Address ?

Image
 IPv6   IPv6 is a short form of Internet Protocol version 6. It was Designed by the IEFT to replace the current version internet protocol, IP version 4 (IPv4) It is also referred to as the next generation internet Protocol. IPv6 Support large Number of hierarchical addresses that will be allow the internet to grow and provide new routing capabilities not built into IPv4. Like IPv4, IPv6 associate an address with specific network connection, not with the specific computer. Thus address segment are similar to IPv4. IPv6 permits multiple prefixes to be assigned to a given network, and allow a computer to have multiple, Simultaneous Address per Network.   Fig: IPv6 Types Of IPv6 Address: There are Three Types of IPv6 Addresses, Which are as Follows:- (1). Unicast : The Destination address specific a single computer (Host or Router), The datagram should  be routed to the destination along a shortest path. (2). Anycast : The Destination is a set of computers possibly at different location, t

What is TCP and UDP ? Its Differences.

Image
 TCP (Transmission Control Protocol) : TCP is a communication Protocol is an Standard way to define how to Establish and Maintain a Network Conversation through which applications or programs can exchange data. TCP work with IP(Internet Protocol),Which define how computer send packets of data to each other. TCP and IP are the basic rules defining the internet.   Fig: TCP Working Dig.                          UDP(User Datagrams Protocol): UDP Provide the primary mechanism that application programs used to you send datagrams to other application programs. UDP provide protocol ports Used to distinguish among multiple programs on a single machine. In UDP, in addition to the data sent, each UDP message contains both a destination port number and a source port number. Making it possible for the UDP software at the destination to delivery the message to the correct recipient and for the recipient to a send a reply. As Show in the given Diagram.      Fig: UDP Working Model. Differences Betwe

What is Sniffing ? Its Types.

Image
Sniffing:- It is the act of collecting packets from network collection using either a special application or aap piece of hardware called as sniffer. A Sniffer takes a copy-of an display all of the traffic and network card sees. When implemented correctly a sniffer is completely passive, having no effect on the traffic. Except for the Fact that it takes processing time and memory, a sniffer Should have no effect on its host computer. Ethereal,Ettercap, and Packetyzer are some popular sniffer that allow for traffic collection and Tcp stream reconstruction. Traffic collection refers to the sniffers ability to receive a copy of network traffic. Traffic analysis is the sniffer's ability to break out relevant fields from the captured packets.  Fig : Packet Sniffing PACKET Sniffing :-  A General packet sniffer captures all packets And something as Diagnostic tools to help you examine and troubleshoot packet contents and connections. Basically the attackers has modified the software of a

What is Phishing?

Image
 Phishing:-   It is the most common form, is the process of luring a victim to a fake website by clicking on a link.The victim usually encounter the link in email message sent to him on a web page Bin browse by him. It's a methods Mostly Used by the hackers to Trap Peoples and get valuable Information From User Site's Or System. Its Many Types of Online Methods to Trap the People and get the Information they want and they use that information in many Purpose or Sold your Information too some one harm you or your data directly or Indirectly. Once the victim click on the link He/She may be induced to divulge sensitive information such as His credit card number or password. Phishing attempts often use URL's dad are very similar to the real URL. For example: Real URL maybe www.Truebank.com  Fake URL maybe www.Trubank.com       FIG : PHISHING  Methods of Phishing: Three of the most popular methods fisher employee are as follows: (1). Impersonation :- Impersonation Is the most p

What is FACEBOOK Lite ?

Image
FACEBOOK Lite is an Lite App of Facebook. Which was espacially Design or developed to easily useable on small mobile and where space have less space to install apps. Facebook Lite App Size Was 1.5Mb Approx. Which was very small and its Easily Able to install by anyone at Any Phone. Its Data Quality and Some special high level functions are not available in Facebook lite. But it contains all the basic features Facebook. Image and vedio quality are medium as compared to Facebook. Shared content has also so have Limited quality. Facebook lite design for small mobile Who cant able to install Facebook. Its Was very Popular in Facebook Apps. Over 1 Billion people Download this Which was very attractive.

What is Cyber Crime? | Its Classifications.

Image
  Cyber Crime :    "A Crime in which a Computer was directly and Significantly instrumental" . " Any illegal that targets the security of  computer system and the data proceed by them,Which is directed by any electronic operation,is called cybercrime ". The term "Cyber-Crime" has other names also such as : Internet Crime. E-Crime. High-tech Crime. Computer Related Crime Etc...    Classification Of Cyber Crime: (1).Crime Targeted Against Individuals:   This Kind of Crime are Exploited because of human weakness like greed and naivety.Financial Frauds,Sale of non existent,child pornography,Copyright violation etc. are example of this crime. As the Internet is Developing Day by Day the Criminals are Exploring them with new tools that are expanded to a large number of victims. (2).Crime Targeted Against Property:   The Stealing of mobile phones is included in this Category.Cell phones,laptops,personal Digital Assistant(PDAs) and Removable medias(CDs and Pen dri

What is (E-Mail or IP)Spoofing?

Image
  Spoofing : The most  Common  Type of Spoofing that You are Likely to encourage is  IP  Or  E-Mail  Spoofing.  Primarily used to  Spoof   The Source  Address  of the E-Mail or IP of the Device. In this Case E-Mail is look Just Like E-Mail come from the Trusted Server or Website.But its come from the Wrong Or Harmful sites Which Directly or Indirectly Affect the Customer In Various Ways. It's Common In Now Days People Submitted Their Emails at many untrusted websites and We Don't know where they use our information.  E-Mail Marketing is also a very Big-market your E-mails also used for that purpose to send you some deals by them and many other uses.                                                                 fig:-  Example Of Spoofing E-Mail Spoofing used to :- (1) . Delivery   a  phishing  message (One that cons the user into divulging confidential information)  Replying to the E-mail won't work properly,but clicking on links in the E-mail will take the user to a spoo