Intrusion Detection System (IDS) Concepts
There are six basic approaches to intrusion-detection and prevention. Some of these methods are implemented in various software packages, and others are simply strategies that an organisation...
Networking Basics
A network is simply a way for machines/computers to communicate.
At the physical level, it consists of all the machines you want to connect...
What is BitTorent and How does it Work?
BitTorrent is a P2P protocol, designed by Bram Cohen, for sharing a large file among a set of peers. However, the term sharing in this context is different from...
All about Proxy Servers
What's a Proxy Server?
An intermediary worker goes about as a door among you and the web. It's a mediator worker isolating end clients...
Hashing, Windows and Linux Encryption
A hash function, “H” for example, is a function that takes a variable-size input “m” and returns a fixed-size string. The value that is returned is called the hash value “h” or the...
Linux Firewalls
Linux has firewall capabilities built into the operating system. This has been a part of the Linux operating system for many years, with occasional improvements in the...
Windows Firewalls
Windows first started shipping a primitive firewall, called Internet Connection Firewall (ICF), with Windows 2000. It was very simple. Each version of Windows since then has expanded...
Introduction to Network Security
Computer data often travels from one computer to another, leaving the safety of its protected physical surroundings. Once the data is out of hand, people with bad intention could...
Introduction to VPN
Virtual Private Networks (VPNs) are a common way to connect remotely to a network in a secure fashion. A VPN creates a private network connection over the...
Basic Network Utilities
Ipconfig
The first thing you want to do is get information about your own system. To accomplish this, you must get a command prompt....