Article on the subject of "protocol"

  • Total crypto market capitalization has surpassed 3 trillion USD

    Total crypto market capitalization has surpassed 3 trillion USD

    the latest data from coingecko shows that the total market capitalization of all listed cryptocurrencies has now reached a dizzying peak, at $3 trillion.
  • Test of technology terminology - Part 11

    Test of technology terminology - Part 11

    in today's article, tipsmake.com introduces you to the next part of the technological termination test series. i wish you successfully completed the test!
  • Most cyber attacks focused on these 3 TCP ports only

    Most cyber attacks focused on these 3 TCP ports only

    small and medium-sized businesses can fully protect themselves from most cyber attacks by increasing defenses against ports that are most often targeted by malicious actors.
  • Check email encryption process

    Check email encryption process

    to facilitate this analysis, it is good to 'talk' directly to your smtp or imap server.
  • Working with Network Monitor (Part 4)

    Working with Network Monitor (Part 4)

    in the previous article of this series, i showed you how to filter the network monitor capture file so that only the communication between the desired servers is displayed. in this part 4, we will introduce you to ha
  • Set up and configure a LAN (Local Area Network)

    Set up and configure a LAN (Local Area Network)

    installing the network card: at first you have to install the network card into the computer by: turning off the computer, removing the computer's cover, then you find an empty slot to plug in the network card. turn the screw back on. then close the case. ...
  • Opera released web page debugging tool

    Opera released web page debugging tool

    on march 14, 2011, software maker opera announced an embedded web browser, a beta toolkit, called dragonfly, that could help developers discover errors in their complex websites.
  • Apache 2.0 with SSL / TLS protocol: Step by step instructions

    Apache 2.0 with SSL / TLS protocol: Step by step instructions

    for more than ten years, the ssl protocol has been widely used to ensure the safety of web transactions over the internet. you can imagine millions of dollars every day, billions of dollars of transactions on the network using ssl. however, the simple truth is us
  • How to connect to a VPN server from Windows XP

    How to connect to a VPN server from Windows XP

    in this tutorial we will show you the steps needed to set up everything in windows xp to allow you to connect to a vpn server.
  • Internet - Something to know

    Internet - Something to know

    vi on the net for hours every day working as well as entertaining, but really how much do you understand the internet? have you ever wondered why the internet was born, where, and who created it? how big is the 'global network' really? how many people
  • Set up ProFTPd with TLS on Ubuntu 11.04

    Set up ProFTPd with TLS on Ubuntu 11.04

    ftp is a popular file transfer protocol used today. however, this protocol gradually becomes less secure because the entire password and data of the file is transmitted as clear text.
  • Popular network protocols today

    Popular network protocols today

    there are many protocols while establishing a connection on the internet. based on the type of connection to be established, the protocols used are also varied. these protocols define the characteristics of the connection.
  • How to choose the best connection protocol for IoT devices

    How to choose the best connection protocol for IoT devices

    in iot, the question of choosing the right connection protocol can make the difference between the device. unlike the internet, iot devices have diverse connectivity protocols, including zigbee, wifi and bluetooth.
  • Knowledge of TCP / IP network protocols

    Knowledge of TCP / IP network protocols

    tcp / ip or transmission control protocol / internet protocol is a set of communication protocols used to connect network devices on the internet.
  • Wireless Application Protocol (WAP) price, marketcap, chart, and fundamentals info

    Wireless Application Protocol (WAP) price, marketcap, chart, and fundamentals info

    wap stands for wireless application protocol. this is a protocol designed for micro-browsers (or mobile browsers) and it allows internet access in mobile devices. wap uses wml (wireless markup language) markup language, not html.
  • What are IKE and IKEv2 VPN protocols?

    What are IKE and IKEv2 VPN protocols?

    internet key exchange, or ike, is an ipsec-based tunneling protocol that provides a secure vpn communication channel and identifies means of automatic connection and authentication for secure ipsec links the way they are protected.
  • Learn about DNSCrypt protocol

    Learn about DNSCrypt protocol

    dns or domain name server is a service that is mapped to an address (ip address) to the url of the website you open in your browser.
  • Learn about the IMAP protocol

    Learn about the IMAP protocol

    internet messaging access protocol (imap) is an internet standard that describes a protocol for retrieving mail from email servers.
  • Learn about Telnet protocol

    Learn about Telnet protocol

    telnet is a command line protocol used to manage various devices such as servers, pcs, routers, switches, cameras, and remote firewalls.
  • Download Broke Protocol, the 'weird' game between GTA and Minecraft is free on Steam

    Download Broke Protocol, the 'weird' game between GTA and Minecraft is free on Steam

    broke protocol is currently free on steam for 100 hours from 0:00 on august 16.
  • What is Post Office Protocol (POP)?

    What is Post Office Protocol (POP)?

    post office protocol (pop) is an internet standard that allows downloading email from an email server to a computer. pop has been updated twice since its first launch in 1984 under the name pop1.
  • Learn about Border Gateway Protocol (BGP)

    Learn about Border Gateway Protocol (BGP)

    border gateway protocol (bgp) is used to exchange routing information for the internet and is the protocol used between isps (which are different ass).
  • How HTTP works

    How HTTP works

    hypertext transfer protocol (http) provides a network protocol standard that web browsers and servers use to communicate. you see http every day because when you visit a website, the protocol is written right in the url.
  • What are Protocol Attacks? How to Detect and Prevent Attacks

    What are Protocol Attacks? How to Detect and Prevent Attacks

    protocol attacks are a type of cyber attack that is carried out by exploiting weaknesses in communication protocols.
  • Things to know about IPv6 protocol

    Things to know about IPv6 protocol

    on june 6, 2012, according to the initiative of internet society (isoc), the world's leading technology and digital content firms such as google, facebook, yahoo ... simultaneously launched services and applications in the background. ipv6.
  • What is PPTP (Point-to-Point Tunneling Protocol)?

    What is PPTP (Point-to-Point Tunneling Protocol)?

    point-to-point tunneling protocol is a network protocol mainly used with windows computers. today, it is considered obsolete when used in virtual private networks, because of many security flaws. however, pptp is still used in some networks.
  • What is the RADIUS protocol?

    What is the RADIUS protocol?

    radius is a network protocol used to authenticate and allow users to access a remote network. the term radius is an acronym for remote authentication dial-in user service.
  • What is SSTP (Secure Socket Tunneling Protocol)?

    What is SSTP (Secure Socket Tunneling Protocol)?

    sstp, or secure socket tunneling protocol, is designed to protect ppp traffic using a ssl / tls channel. sstp is better and much more secure for windows users than l2tp / ipsec or pptp.
  • Apache 2.0 with SSL / TLS protocol: Step by step instructions

    Apache 2.0 with SSL / TLS protocol: Step by step instructions

    for more than ten years, the ssl protocol has been widely used to ensure the safety of web transactions over the internet. you can imagine millions of dollars every day, billions of dollars of transactions on the network using ssl. however, the simple truth is us
  • What is DHCP or dynamic host configuration protocol?

    What is DHCP or dynamic host configuration protocol?

    dhcp (dynamic host configuration protocol or dynamic host configuration protocol) is a protocol used to provide fast, automated and centralized management for ip address distribution in the network.
  • What is RARP and how is it different from ARP and ICMP?

    What is RARP and how is it different from ARP and ICMP?

    reverse address resolution protocol (rarp) is a network protocol used to map a device's media access control (mac) address to its corresponding internet protocol (ip) address.