Archive

What is the risk caused by the POS malware which is recently in the news? The malware can supposedly act as a an advanced backdoor.what is a a backdoor in computing and why is it created?What can the POS malware affect? Why are ticketing systems and kiosks in public places,particularly at risk from this malware?

 

Read more

What is the Kerberos authentication protocol? What does it provide? Discuss some characteristic points of the Kerberos Authentication. In this context,  please explain what is a Key distribution center? Kerberos authentication uses ticket gating service(TGS). What is TGS used for. Explain how the Kerberos authentication process works. Why is it named as Kerberos?

 

Read more

Name the different networking and inter networking devices that are commonly used in a network. What is the difference between a bridge and a router Which layer of the network will a redirector come under. What does it do? What is the function of a packet filter in Networking? Is it a standard router?

 

Read more

Hello, I have a Samsung F5800 Plasma TV in my office. I am facing a problem with it for last few days. Every time I turning it on, it pops up a message that says " Un-identified input or bad connection". I have checked all the connections thoroughly, nothing found. Can any person help me out please?

Read more

What is a Protocol Data Unit (PDU)?what are the 4 fields contained in a PDU? What are the functions of each of these components?  What are the data units created at each layer of the TCP/IP suite? Explain the process of creation of these different types of data units across the 7 network layers.A

 

Read more

How many types of server are there in a general networking environment? What is the difference between  a 2 tier client server architecture and a 3 tier architecture? What are the major technologies used to create client server architecture? How is peer to peer networking model different from the client server architecture? What is a web server?

 

Read more

What is meant by Transparency in Networking? What are the types of Transparency? What is distribution transparency? In firewall technology where is transparency defined? Why do we need network transparency? In the Sun Microsystem Network File System how can a user access shared files? Explain how the NFS works and how does it benefit users  with easy access of data?

 

Read more

What is a middleware? Where in the network is it positioned. Explain how it functions. Which are the broad classes of middleware available? What is Service Apecific Middleware? What is general Middleware? What are the components of a general middleware? What is a message oriented Middleware? Where would I this type of middleware and why? 

 

Read more

The Double direct attack is putting iOS and Android users at risk.The Double Direct attack  is known to be a man in the middle attack? What happens in a man in the middle attack? What could be the consequence of the Double direct attack on the victim's cellphone or mobile devices?

 

Read more

What is Direct attached Storage (DAS)? How is it different from Storage area Network (SAN) and Network attached Storage (NAS)? What are the advantages provided by DAS over NAS and SAN? Where then would you say that DAS has a limitation? Where is a DAS device housed? Can it be connected to multiple devices?

 

Read more