Skip to main content

Posts

Samba

                                            Samba Server       When we transfer a any file,folder or any information then its called "Data Transfer."  The data transfer is most important task in our day-to-day life. We transfer a data between two mobiles using Bluetooth or using various apps.We transfer a data between two computers using network. But how to transfer or shares files between to  different computers which have a different operating systems.At that time we need to uses a samba software.  Consider two computers one have a windows operating system and another one Linux. Then how we shares a file ????  That time uses a Samba Server .     Whats Samba??                                        ...

Piconet and Scatternet

                                 Piconet and Scatternet         Transfer a data to various people  its become most important now a days. There are a lots of methods are available to  share to data or transfer to data.But I explain here about the Bluetooth  Piconet and Scatternet. Piconet:           Piconet gets its name fro the world "pico". Pico means a very small.         A piconet is nothing but small network. Using this network we can share the data or transfer the data .Its one ad-hoc network.Which links a wireless user group of devices,using Bluetooth  technology.         Piconet is formed at least two devices such as portable PC and a cellular phone to connect. Ad maximum 8 to need to make this network.When network is established, one device act as master and other as sa...

Search Engine

                                     Search Engine Search Engine:                   The search engine is computer program or software system   which allows to find the information  on World Wide Web.       Ex. Google,Yahoo, bing etc                  In this digital world we are using most of time this search engines.But we have no idea about how the search engine works?      2.How the search engine works?                  Each search engine works in three main steps.                      i)Crawling                     ii)Indexing                   ...

Dumpster Diving

                                     Dumpster Diving        Attacker does not launch their attack without any information. This information gets from targets trash.        If attacker gets the information from the targets trash is called Dumpster Diving.Its belongs to the Social Engineering.      In the dumpster diving the attacker search the small data in trash and it get very sticky information like a pin number,username,password etc,.       In computer security dumpster diving is like a dumping. That means the rubbish unwanted waste,unwanted materials etc,.           How to avoid Dumpster Diving? Avoid throwing sensitive information in the trash. Company should have some polices about to destroy trash. Company should contain trash container.

Computer Virus

                                          Computer Virus Computer Virus:                    Computer virus is one program or piece of code typically affect on the system such as a corrupting file,destroy itself.    Following are the different categories of                  viruses:                     i) Boot Sector virus                    ii) Macro virus                   iii) Multipartic  virus                   iv) TSR virus                    v) Stealth virus             ...

Network Security

                                        Network Security       Network Security:                    Network security is a one privacy  policy  which tries to keep a secure the whatever data,files,directories in your computer network.It gives security hardware as well as software.                 Authorization of access to data in network which is controlled by the network admin.Users are assigned only using their username and password. Various way which gives security to the network :  Encryption Firewall Antivirus software IDS(Intrusion Detection System) IPS UTM     1. Encryption:         Encrypting communication  between two hosts its also gives a privacy that's security. 2. Firewall:     ...

Command Prompt Tricks

                            COMMAND PROMPT TRICKS  Command Prompt:   The command prompt is non-graphical interface that available in most of the windows operating system. The command prompt is is also referred as command interpreter because it interprets commands you enter.      To initiate the command prompt: start Enter the cmd in the box                  cmd open with as a administrator Useful Windows Command Prompt Tricks: 1. Change the fonts color in Command Prompt:       Normally command prompt have a black color. But it is possible to change the font color of the command prompt.           command used for:                          color number/letter           Ex:     ...