Subscribe to Updates
Get the latest creative news from FooBar about art, design and business.
Author: Samikshya
A proxy server acts as a gateway between you and the internet. It’s an intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy depending on your use case, needs, or company policy. If you’re using a proxy server, internet traffic flows through the proxy server on its way to the address you requested. The request then comes back through that same proxy server (there are exceptions to this rule), and then the proxy server forwards the data received from the website to you. If that’s all it does, why…
A domain name is essentially your website’s equivalent of a physical address. In the same way that a GPS needs a street address or a zipcode to provide directions, a web browser needs a domain name to direct you to a website. A domain name takes the form of two main elements. For example, the domain name Facebook.com consists of the website’s name (Facebook) and the domain name extension (.com). When a company (or a person) purchases a domain name, they’re able to specify which server the domain name points to. Some examples of domain names include: IsItWP.comGoogle.comFacebook.comWikipedia.orgYahoo.comWhitehouse.gov For a more technical…
Protocol, in computer network a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it. Without a protocol, a transmitting computer, for example, could be sending its data in 8-bit packets while the receiving computer might expect the data in 16-bit packets. Protocols are established by international or industry wide organizations. Perhaps the most important computer protocol is OSI (Open Systems Interconnection), a set of guidelines for implementing networking communications between computers. Among…
Network protocols are a set of rules, conventions, and data structures that dictate how devices exchange data across networks. In other words, network protocols can be equated to languages that two devices must understand for seamless communication of information, regardless of their infrastructure and design disparities. The OSI model: How network protocols work OSI( open System Interconnection) model is the tool for understanding the communication method between any two network system it is the systematic way to define how the network world.. OSI reference model have seven layers and function of each layers is explained below: Physical layer: the main…
Two or more computers that are connected with one another for the purpose of communicating data electronically. Besides physically connecting computer and communication devices, a network system serves the important function of establishing a joint architecture that allows a variety of equipment types to transfer information in a near-seamless fashion. A network can be defined as a group of computers and other devices connected in some ways so as to be able to exchange data. -Each of the devices on the network can be thought of as a node; each node has a unique address. Addresses are numeric quantities that are easy for computers to work…
VPN creates the secure connection between you and the internet. When you connect to the internet via a VPN, all your traffic is sent through an encrypted virtual tunnel. In other word VPN gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your internet protocol (IP) address so your online action are virtually untraceable. Most important, VPN services establish secure and encrypted connections to provide greater privacy than even a secured Wi-Fi hotspot. How Does VPN work? After subscribing to a VPN router, you can usually download and install an easy…
Wireless networks are becoming more common in businesses and homes. Most mobile devices now come with a wireless network associated with the device’s brand or carrier. There are also public hotspots at restaurants, coffee shops, and airports to name a few. This makes it easier for us to catch up on work or with friends online. However, no matter how convenient wireless networks might be they can present a security risk. Data can be stolen resulting in penalties. Here are some of the risks organizations and individuals need to be aware of. In this blog we will describe about the security…
Wireless protocol is the set of rules that determines set of rules that determine how data is transmitted between different devices. Essentially, it allows connected devices to communicates with each other, regardless of any differences in their internal processes, structure and design. There are many wireless protocols established these days but the main protocols are Bluetooth, WiMax and Zigbee. In this blog we willexplain about these protocols in shortly. Bluetooth: Bluetooth is described under IEEE 802.15.1 as a wireless communication technology which works under a limited space around a distance of 10 meters. Bluetooth works under the range of 2.4GHZ.…
Home Network Hardware Components: An Internet home network consists og variety of hardware and software component. In this blog we will look at various components that will create a computer network and connect it to the internet.The basic principle is same for the components that are used in home network and large co-operate house. The Different components and functions of devices are explained below: Home Routers: A router connects networks together. Routers operate at the networking level of the TCP/IP protocol stack.On Home networks the router is responsible for connecting the home network to the Internet and provides several important…
What Is Firewall: A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) in order to block malicious traffic like viruses and hackers. A firewall is a security device computer hardware or software that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer. Not only does a firewall block unwanted traffic, it can…