What is computer Trojan?

what are Trojans? A computer software that perform malicious operations without the knowledge of the user are called Trojan. A Trojan is a hidden software that executes commands, which usually gives access to the computer on which it is running by opening a backdoor.   Effects of Trojan: Recovery of passwords or other confidential data on infected computer. Joint … Read more What is computer Trojan?

What is Denial of Service attack?

Denial of Service attack A Denial of Service is a type of attack to make services unavailable for an indefinite period of time of an user or an organization. It is mostly attacks against servers of a company, so they can be used and consulted. The purpose of such attack is not to retrieve or alter … Read more What is Denial of Service attack?

CCDA Certification and training tutorials | Cisco Certified Design Associate

certifications

What is CCDA? Cisco Certified Design Associate (CCDA) certification is about designing the Cisco network in most efficient way. CCDA course is for validating all fundaments related to network designing, its cover void Variety of route and switch design and covers LAN, WAN, broadband, campus, data-center and wireless network design.Cisco recommends before you attempt the … Read more CCDA Certification and training tutorials | Cisco Certified Design Associate

WLAN Security | The Best Practices

Wireless authentication process

Security in wireless network is a very essential and while designing a WLAN you have to focus and consider the following important aspects of security. 1EEE 802.11i/WPA2: In WLAN we have different security protocols for security. One of the famous protocol is WEP (Wired Equivalent Privacy) that emerge with 802.11b standard but it is faulty … Read more WLAN Security | The Best Practices

Network Security Design | CCDA security Management

Network security

Deigning network with implementing security: CCDA security management is about the Implementation of security with some design standpoint, as a CCDA candidate you should understand the reason of network security and some efficient approaches for implementing the network security. You also need to focus on confidentially, integrity and Authentication. You can design a good secure … Read more Network Security Design | CCDA security Management