MALWARES

“INTRODUCTION TO MALWARES” Malware is a collective term for any malicious software which enters system without authorization of user of the system. The term is created from merging the words  malicious‘ and  software‘.Malware is a very big threat in today‘s computing world. It continues to grow in volume and evolve in complexity. As more and … Read more

Selection Sort Algorithm

sorting algorithm

Selection Sort Algorithm Selection sort is an algorithm that selects the smallest element from an unsorted list in each iteration and places that element at the beginning of the unsorted list. The Selection sort algorithm is based on the idea of finding the minimum or maximum element in an unsorted array and then putting it … Read more

VPN THREATS

“VPN THREATS” HACKING ATTACKS- A client machine may become a target of attack, or a staging point for an attack, from within the connecting network. An intruder could exploit bugs or mis-configuration in a client machine, or use other types of hacking tools to launch an attack. These can include VPN hijacking or man-in-the-middle attacks. … Read more

IPSEC VPN and VPN SECURITY ISSUES

“IPSEC VPN” IPSec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. Earlier security approaches have inserted security at the application layer of the communications model. IPSec is said to be especially useful for implementing virtual private networks and for remote … Read more

VPN TYPES and VPN TUNNELING

“VPN TYPES” Virtual private network technology is based on the idea of tunneling. VPN tunneling involves establishing and maintaining a logical network connection (that may contain intermediate hops). On this connection, packets constructed in a specific VPN protocol format are encapsulated within some other base or carrier protocol, then transmitted between VPN client and server, … Read more

VIRTUAL PRIVATE NETWORK SECURITY

“INTRODUCTION TO VPN” Tremendous strides in computer networking have increased the productivity of todays workers in todays workplace. The security risk in networking today has also grown. VPN routing uses virtual connections (instead of the traditional dialed line or a leased line) to connect users in remote offices to a private network over a public … Read more

Heap sort algorithm

sorting algorithm

Heap sort algorithm Heap sort was invented by John Williams. Heap is a complete binary tree in which every parent node be either greater or lesser than its child nodes. Heap sort is a comparison based sorting technique based on Binary Heap data structure. It is similar to selection sort where we first find the maximum element … Read more

SECURING THE SERVER OPERATING SYSTEM

Most commonly available servers operate on a general-purpose OS. Many security issues can be avoided if the OSs underlying the servers are configured appropriately. Because manufacturers are unaware of each organization‘s security needs, server administrators need to configure new servers to reflect their organizations‘ security requirements and reconfigure them as those requirements change. The practices … Read more

WINDOWS VULNERABILITIES AND THREATS

WINDOWS VULNERABILITY OVERVIEW The family of Windows Operating systems supports a wide variety of services, networking methods and technologies. Many of these components are implemented as Service Control Programs (SCP) under the control of Service Control Manager (SCM), which runs as Services.exe. Vulnerabilities in these services that implement these Operating System functionalities are one of … Read more

Quick Sort Algorithm

sorting algorithm

Quick Sort Algorithm There are may versions of Quick sort, which is one of the most popular sorting methods due to its speed (O(N lgN) average, but O(N^2) worst case). Here’s the steps to follow: Pick a “pivot” item Partition the other items by adding them to a “less than pivot” sublist, or “greater than … Read more