APPLICATIONS OF FIREWALL & FIREWALL EVASION TOOLS

APPLICATIONS OF FIREWALL There are three application of firewall: NAT- There are many ways to implement a firewall, but the most popular for both hardware and software routers is Network Address Translation or NAT. Most inexpensive routers use NAT as the means to share one IP address among many computers. NAT also provides a natural … Read more

FIREWALL

“FIREWALL SECURITY” A firewall is a structure intended to keep a fire from spreading. Buildings have firewalls made of brick walls completely dividing sections of the building. In a car a firewall is the metal wall separating the engine and passenger compartments. Internet firewalls are intended to keep the flames of Internet hell out of … Read more

DATABASE ATTCKS

DATABASE ATTCKS we have list of most critical database attacks, & they are: 1. Excessive privileges: When users (or applications) are granted database privileges that exceed the requirements of their job function, these privileges may be used to gain access to confidential information. For example, a university administrator whose job requires read-only access to student … Read more

DATA SECURITY

INTRODUCTION Data means groups of information that represent the qualitative or quantitative attributes of a variable or set of variables.Data is the raw form of information stored as columns and rows in our databases, network servers and personal computers. This may be a wide range of information from personal files and intellectual property to market … Read more

Merge Sort Algorithm

Merge Sort Algorithm Merge Sort is a Divide and Conquer algorithm. It divides input array in two halves, calls itself for the two halves and then merges the two sorted halves. The merge() function is used for merging two halves. The merge(arr, l, m, r) is key process that assumes that arr[l..m] and arr[m+1..r] are sorted and merges … Read more

Linear Search vs Binary Search

Binary search example

Linear Search vs Binary Search A Linear Search is the most basic type of searching algorithm. A Linear Search sequentially moves through your collection (or data structure) looking for a matching value. In other words, it looks down a list, one item at a time, without jumping. Think of it as a way of finding your way in a phonebook Binary … Read more

Matrix multiplication program in C

c program for two-dimensional arrays

Matrix multiplication program in C Matrix multiplication in C language to calculate the product of two matrices (two-dimensional arrays). A user inputs the orders and elements of the matrices. If the multiplication isn’t possible, an error message is displayed. You may have studied the method to multiply matrices in Mathematics. Matrix multiplication in C language … Read more

IT-SECURITY(PASSWORD SECURITY)

PROTECTING YOUR PASSWORD AND LOGGING ON SECURELY Hackers who know your password do not have to resort to technological exploits; they can log on and do anything that you can do on the computer or network. Keeping your password secret is one of the most important things you can do to protect against security breaches. … Read more

IT-SECURITY(PORTABLE DEVICES)

SOFTWARE SECURITY FOR PORTABLE COMPUTERS The best defense for portable computers is theft prevention, but there are ways to minimize the impact if your portable does get stolen. Setting a startup password is a first step, although thieves may be able to defeat this by resetting the password or using a master password that is … Read more

IT-SECURITY(PROTECTING YOUR COMPUTER AND NETWORK)

PROTECTING YOUR COMPUTER AND NETWORK   PHYSICALLY SECURING LAPTOP/NOTEBOOK/HANDHELD COMPUTERS Portable computers can be even more vulnerable because it is so easy to steal the entire computer. A thief might then be able to access the data stored on the hard disk and log on to the organization ̳s network remotely, if additional protective measures … Read more