Which device you connect with the help of straight cable?
Straight through cables can be used to connect devices together via switches, hubs, routers, bridges.
A core switch is one that ties all the communication together. A switch allows computers to connect together. A core switch ties switches together.
How do you leave a message to another user of the same computer without using Internet or intra net?
If it is the same computer, then the users are presumably physically accessing the computer. The low-tech approach would be to use a post-it note.
Electronically, there are many ways to accomplish this. You might have a logon script that checks a certain file for information and then displays it on the screen for a user, you might schedule a task to be run at a certain time, etc.
A symmetric cipher is an algorithm that uses the same secret (private key) for both encryption and decryption. An asymmetric cipher is an algorithm that uses two different secrets, a public key for encryption, and a private key for decryption.
In English, basically the job of cryptography algorithms are to make text or files jumbled so it can't be read except by the desired recipients. Different algorithms use different techniques for doing this such as switching the order of letters or substituting them with a different letter, and the secret provides the exact instructions on how to do that.
Is there any md5 or sha256 code for tso rexx?
Yes, I'm sure someone has implemented the functionality. The newer versions of REXX may have a function call to create the hash value.
Can you DDoS the entire internet?
No you can't, you just do not have enough resources for that. It does not matter how much infected computers you have, the number of computers in internet is more. And because for DDoS requirements (many computers sending requests to one particular adddress) you have to have all internet infected, nobody can do that.
What are ethical issues a network administrator may encounter?
You need to be very reliable you don't need to open someone else data and says don't bother you need to be very responsible you need to be able to do your own things with abusing anything without altering without erasing and the security measures should never be neglected you need to be consistent
a tcp header contains the information of the source and destination networks and well as what port to access with out it the packet would not know where to go
Pslist lists detailed process information. It shows which process is running, the CPU time and Elapsed time of the process, along with other details
A signal jammer or jamming transmitter is a small, low-powered transmitter that interfers with receivers in an area around the jammer. The radius of the area will depend on the power of the jammer. The jammer signal will be "seen" by the receiver and it won't then be able to "see" the little signal of the remotely located transmitter that it is trying to "look at" before you turn on your jammer. The jammer transmits a signal (without modulation - it's just the carrier wave) that radiates from the jammer pretty much in all directions (for an omni-directional antenna - which is what is usually on them). This small signal reaches all receivers within the area of its effective range and "swamps" the receivers in that area. Understand that the transmitters reaching out to receivers are generally "high power" units (their power varying depending on what they're designed to do). The jammer is low power. But because the signal from the transmitter is (almost always) a long, long way away from the receivers in the jammer's area, the signal from the transmitter is very tiny in that area. The jammer, on the other hand, has a "large" signal in that area because it's so close to those receivers. It's the amount of signal that gets to a receiver that is important. If a tiny transmitter (a jammer) is "right on top" of a receiver, it will "hit" that receiver hard compared to the tiny signal getting to that receiver from the (high powered) transmitter many miles away. The general rule for power for a transmitter getting to a receiver is that the signal strength is going to be the inverse sqare of the distance from that transmitter. That means that if you have "x" amount of signal at a given spot from a transmitter and them double your distance from the transmitter, the signal will be 1/d2 or 1/22 or 1/4th the amount you had before. Double the distance again and you're down to 1/16th the original amount of signal. A little transmitter works well to jam a receiver if it's right on top of it. It will "blind" the receiver to the "real" signal from the transmitter it is trying to capture. Jammers are generally a no-no, both ethically and legally. Use your head here and think through your options if you are planning some "experimental" electronics. It is the FCC (the Feds) that get down on individuals who interfere with communications. They play hard ball. Imagine interrupting air-to-ground communications and interfering with air traffic. They'd lock you up and throw away the key. Seriously.
TTL stands for "Time To Live". This is a piece of data in a network packet that specifies how many routers the packet can pass through before the packet expires and is thrown away.
Every router that the packet travels through subtracts one from the TTL counter. When it reaches zero, the packet expires. The router will drop the packet, and then send a message back to the computer that sent the packet telling it that the packet has expired.
The purpose of the TTL counter is to make routing loops less dangerous. Let me explain....
Routers are devices that look at an incoming data packet and decide where to send it to get it one step closer to its destination. It's possible for one or more routers to be configured such that router A sends the packet to router B, which sends it to router C, which sends it to router A, which then starts it over again. Without the TTL counter, this packet (and any subsequent packet sent to the same destination) would circulate endlessly, taking up bandwidth until someone fixes the routing loop.
However, with TTL, each router subtracts one from the TTL counter until eventually the counter hits zero and the packet goes away, giving someone time to fix the problem before the links are so congested with looping packets that it's no longer possible to talk to the router.
TTL can affect network security in a couple of ways.
Most operating systems set the TTL counter to 64 or 128, which is a pretty large number that will guarantee your packet can get across the Internet.
To improve your network security, you can set your TTL counter to a low number. If your internal network is only four routers wide, you can set your TTL to 4. This will ensure that any packets generated on your network will not travel very far beyond your internal network.
An attacker can also use the TTL feature to probe your network for the existence and address of your routers. This feature is used by the "traceroute" or "tracert" utility. It works by sending out a packet with a TTL of 1. The first router that the packet encounters will decrement the TTL to 0, drop the packet, then send a message to the traceroute program telling it that the packet expired. By looking at the source address of this packet, traceroute knows the address of the first router. Next traceroute sends a packet with a TTL of 2, which causes the packet to expire at the second router, which sends a message back to traceroute and exposing its address. And so on.
Once an attacker knows the addresses of your routers, he or she can start working on compromising them, which can cause you no end of security problems.
The solution is to prevent these packets from reaching your routers by using a firewall to block them.
HTH,
Gdunge
Distribute between cut through and store and forward switch?
In cut through switch received data is directly forwarded to the destination & in the store and forward switch received data is stored in the switch for future use and then forwarded to the destination.
An error 138 network error - access denied error on Google Chrome indicates that the computer is unable to access the internet. The first thing to check is that either the Ethernet cable is plugged into the computer or the Wi-Fi connection is turned on and able to access the internet. If this has been checked and is working it could be a Windows or third party firewall issue, which can be fixed by allowing access to Google Chrome in the firewalls 'allowed programs' area. Once access has been given the computer may need to be restarted to allow full access.
What is difference between Prime Security Collateral Security?
Prime security is the one which is funded by banks for raw material, power, finished goods etc are taken by bank as prime security.
The collateral security, which is non-funded by banks. But in turn the borrower keep it as security with bank. Such as any mortgage, Fixed asset etc
network
data-link
Can someone hack into your computer using Teamviewer?
No sir, if you have it running in the back ground than maybe, but i doubt they will get your password, it regenerates every time you restart your TV and if they get it wrong i believe you get a warning so you can generate a new one or shut it down fast :Pso yeahh NO :D
You need a VoIP modem or a computer to connect your phone and accessed your VoIP Server. Aditionally you also require an ATA adapter.
What is network different kind of network?
sometimes Small Area Network
Network.
( VIKRAM SINGH )
what engine is it and which belt?? timing or serpentine?
What are the advantages anddisadvantages of token ring topology?
Advantage: No packet collisions Disadvantage: Single point of failure
How can you reduce the risks in access control?
Good question - access control must be carefully audited, before and after implementation. You don't want to give someone too much access if their job or position does not require it, and too little for others so that they can't do their job appropriately.
What security protocols are predominantly used in Web-based electronic commerce?
§SET, SSL, and S-HTTP