Filename Extension Holds Variable Number of Words From Two Worded Like .pl, .sh Through Three, Like .png, .gif, Can Be Four Like .jpeg or Longer. Why They Varies in Number? In other words, is not it would e great if all the file extensions had an universal number of words to avoid typographical errors? There is a long history behind these Filename Extension. Filename Extension : … [Read more...]
Why WWW Prefix Was Introduced
There is historical reason why WWW was appended before the domain nearly 2 decades back from today. Confusion is common among the common users. It is quite sad that, at the age of Internet of Things (IoT), most still never understand a practical fact - appending www has no value anymore because today domains are registered as bare domain, like example.com, wordpress.org, abhishekghosh.net via the … [Read more...]
What is Time Synchronized Mesh Protocol (TSMP)?
What is Time Synchronized Mesh Protocol (TSMP)? TSMP has similarities with Time-division multiplexing and now in focus due to IoT and Wireless Sensor Network. In our previously published article; we have discussed about the Protocols Related to Internet of Things (IoT) and we have mentioned about this Time Synchronized Mesh Protocol (TSMP). In this article, we will discuss about Time Synchronized … [Read more...]
Technical Aspects of Data Security in the Cloud
Technical aspects of data security in the cloud is one of the main reason why the companies or the end users thinks to be in the cloud. Here is a discussion. Cloud computing is no longer just a buzzword, over the years cloud computing has established itself as a serious technology as alternative resource for infrastructure, platforms and applications. Cloud computing now offers own cloud based … [Read more...]
Zoom Lens : Design and Technical Details
Zoom Lens contains the word zoom, means a quick motion indicating the capability of changing focal length. Technical know how of zoom lens is discussed in this article. We have a basic article on Zoom Lens too - Zoom Lens and Digital Photography. Also common designations such as varifocal lens or Vario system are used to indicate this Zoom Lens. While the zoom and varifocal lenses hold constant … [Read more...]
WebRTC or Web Real-Time Communication
WebRTC or Web Real-Time Communication is a programming interface which is currently at the stage of draft in the W3C for voice call, video chat, file sharing. Programming interface here means API which was discussed before.WebRTC or Web Real-Time Communication is a dedicated list, which was created in April 2011 and a working group within the IETF created in May 2011. It is an example of software … [Read more...]
Cloud Computing in Small Business : Outlook
Cloud Computing in Small Business such as ERP, also shows expected competitive advantages through cloud until the competitor has implemented a similar model. This article is an outlook based on our previous three articles - Strategic Requirements for Including Cloud computing for Small Businesses, Opportunities and Risks of Cloud Computing for Small Business and Use of Cloud Computing in Small … [Read more...]
Command and Control Server and Technologies
Command and Control Server are centralized servers which are able to send commands and a part of Botnet. Botnet is group of computers to run automated program. The bots (came from the English words - "robots") can run on the networked computers whose network connections are available as well as on local resources and collect the available data. So, as can be understood, Command and Control Server … [Read more...]
Sandbox in Computer Security
Sandbox allows the execution of software(s) with less risk to the operating system. These are often used to execute untested code of dubious origin. We talked about Advanced Persistent Threats or APT in an older article, also we mentioned we use Sandbox mode to check them. The term Sandbox is also used in a broader sense to refer to a test environment for software or websites - we are not talking … [Read more...]
Advanced Persistent Threat
Advanced Persistent Threat (APT) is a terminology which is often used in the area of cyber threats (cyber attack) for describing the complex, purposeful and effective attack on critical IT infrastructures and confidential data from public authorities, large- and medium-sized enterprises from all sectors, which represent potential victims because of their technological lead. In the course of such … [Read more...]
How to Analyze Network Traffic to Detect Advanced Persistent Threats
Many IT workers feel more like firemen than like networking professionals. They detect network attacks, respond to them and move on to the next problem. However, putting out fires is an ineffective approach because research has shown that most cyber attacks are not one-time events. They are a series of ongoing attacks designed to probe a network's weakness and compromise it. While knowing that … [Read more...]