Article on the subject of "network protocol"

  • Automate TELNET commands using VB Script

    Automate TELNET commands using VB Script

    batch processing with batch files (batch jobs) and recently using windows scripts (.wsf) are the top choice for network administrators, to increase productivity in a dark way. the best.
  • Knowledge of TCP / IP network protocols

    Knowledge of TCP / IP network protocols

    tcp / ip or transmission control protocol / internet protocol is a set of communication protocols used to connect network devices on the internet.
  • What is MTU?

    What is MTU?

    the maxium transmission unit (mtu) is the largest data packet size, measured in bytes, that can be transmitted over a network.
  • Officially released TLS 1.3, promising a faster, safer Internet world

    Officially released TLS 1.3, promising a faster, safer Internet world

    ieft said transport layer security 1.3 will bring 'major improvements in security, speed and privacy'. it's been 10 years since the last release and the development of the new protocol has lasted for 5 years.
  • What is the newly announced WPA3 WiFi security protocol?

    What is the newly announced WPA3 WiFi security protocol?

    the new wifi alliance announced the long-awaited new generation wireless security protocol - wifi protected access (wpa3).
  • Popular network protocols today

    Popular network protocols today

    there are many protocols while establishing a connection on the internet. based on the type of connection to be established, the protocols used are also varied. these protocols define the characteristics of the connection.
  • Knowledge of TCP / IP network protocols

    Knowledge of TCP / IP network protocols

    tcp / ip or transmission control protocol / internet protocol is a set of communication protocols used to connect network devices on the internet.
  • The new Diameter protocol is as easy to attack as SS7

    The new Diameter protocol is as easy to attack as SS7

    network security researchers say the diameter protocol used on 4g (lte) network services and data transmission is also vulnerable to the previous ss7 ss7 standard of older standards like 3g, 2g and previous. there.
  • New error detection in 4G LTE protocol

    New error detection in 4G LTE protocol

    scientists from purdue and iowa university have discovered new vulnerabilities in the main protocol of the 4g lte mobile network - currently very popular in the world.
  • What is the RADIUS protocol?

    What is the RADIUS protocol?

    radius is a network protocol used to authenticate and allow users to access a remote network. the term radius is an acronym for remote authentication dial-in user service.
  • Linux Removes Outdated, Insecure USB Network Protocol Still Present on Windows

    Linux Removes Outdated, Insecure USB Network Protocol Still Present on Windows

    greg kroah-hartman, a member of the linux foundation, seems ready to disable the rndis usb protocol driver once and for all.
  • Officially released TLS 1.3, promising a faster, safer Internet world

    Officially released TLS 1.3, promising a faster, safer Internet world

    ieft said transport layer security 1.3 will bring 'major improvements in security, speed and privacy'. it's been 10 years since the last release and the development of the new protocol has lasted for 5 years.
  • How IP addresses work

    How IP addresses work

    any device connected to a network such as a computer, tablet, camera, etc., will need a unique identifier for other devices to know how to access it. in the tcp / ip protocol, that identifier is called an internet protocol address or ip (internet protocol - ip) address.
  • Learn about Telnet protocol

    Learn about Telnet protocol

    telnet is a command line protocol used to manage various devices such as servers, pcs, routers, switches, cameras, and remote firewalls.
  • How to check open ports in Linux

    How to check open ports in Linux

    when troubleshooting network problems or trying to improve security for linux computers, you need to know which ports are open. this article will show you some ways to test open ports in linux.
  • KRACK attack breaks down the WPA2 WiFi protocol

    KRACK attack breaks down the WPA2 WiFi protocol

    researcher mathy vanhoef from leuven university discovered a serious security flaw on wi-fi protected access ii (wpa2) network security protocol.
  • Apache 2.0 with SSL / TLS protocol: Step by step instructions

    Apache 2.0 with SSL / TLS protocol: Step by step instructions

    for more than ten years, the ssl protocol has been widely used to ensure the safety of web transactions over the internet. you can imagine millions of dollars every day, billions of dollars of transactions on the network using ssl. however, the simple truth is us
  • How HTTP works

    How HTTP works

    hypertext transfer protocol (http) provides a network protocol standard that web browsers and servers use to communicate. you see http every day because when you visit a website, the protocol is written right in the url.
  • What is an IP address?

    What is an IP address?

    ip address (internet protocol ip) is the number of formats for a network hardware, devices that use ip addresses to communicate with each other over an ip-based network like the internet.
  • What is RARP and how is it different from ARP and ICMP?

    What is RARP and how is it different from ARP and ICMP?

    reverse address resolution protocol (rarp) is a network protocol used to map a device's media access control (mac) address to its corresponding internet protocol (ip) address.
  • What is PPTP (Point-to-Point Tunneling Protocol)?

    What is PPTP (Point-to-Point Tunneling Protocol)?

    point-to-point tunneling protocol is a network protocol mainly used with windows computers. today, it is considered obsolete when used in virtual private networks, because of many security flaws. however, pptp is still used in some networks.
  • Automate TELNET commands using VB Script

    Automate TELNET commands using VB Script

    batch processing with batch files (batch jobs) and recently using windows scripts (.wsf) are the top choice for network administrators, to increase productivity in a dark way. the best.
  • What is DHCP or dynamic host configuration protocol?

    What is DHCP or dynamic host configuration protocol?

    dhcp (dynamic host configuration protocol or dynamic host configuration protocol) is a protocol used to provide fast, automated and centralized management for ip address distribution in the network.
  • What is DHCP and Static IP? Should I choose DHCP or Static IP?

    What is DHCP and Static IP? Should I choose DHCP or Static IP?

    dhcp (dynamic host configuration protocol) is a network protocol used to automatically configure ip for network-connected devices.
  • What is the Tracert command?  How to apply Tracert effectively?

    What is the Tracert command? How to apply Tracert effectively?

    tracert is the windows-based command-line tool used to determine the path from the source to the destination of an internet protocol (ip - internet protocol) package. tracert (traceroute) finds its way to the destination by sending echo request messages (requires reprogramming) internet control