IPSEC VPN and VPN SECURITY ISSUES

“IPSEC VPN” IPSec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. Earlier security approaches have inserted security at the application layer of the communications model. IPSec is said to be especially useful for implementing virtual private networks and for remote … Read more

VPN TYPES and VPN TUNNELING

“VPN TYPES” Virtual private network technology is based on the idea of tunneling. VPN tunneling involves establishing and maintaining a logical network connection (that may contain intermediate hops). On this connection, packets constructed in a specific VPN protocol format are encapsulated within some other base or carrier protocol, then transmitted between VPN client and server, … Read more

VIRTUAL PRIVATE NETWORK SECURITY

“INTRODUCTION TO VPN” Tremendous strides in computer networking have increased the productivity of todays workers in todays workplace. The security risk in networking today has also grown. VPN routing uses virtual connections (instead of the traditional dialed line or a leased line) to connect users in remote offices to a private network over a public … Read more

Heap sort algorithm

sorting algorithm

Heap sort algorithm Heap sort was invented by John Williams. Heap is a complete binary tree in which every parent node be either greater or lesser than its child nodes. Heap sort is a comparison based sorting technique based on Binary Heap data structure. It is similar to selection sort where we first find the maximum element … Read more

Why new year start from 1st January

happy-new-year-2020

Why new year start from 1st January 1 जनवरी से ही नए साल की शुरुआत क्यों? 1 जनवरी, यानी नए साल की शुरुआत। 1 जनवरी को कई देशों में नया साल मनाया जाता है। लेकिन बहुत से लोगों को यह पता नहीं है कि सदियों तक 1 जनवरी को नया साल नहीं होता था। कभी … Read more

SECURING THE SERVER OPERATING SYSTEM

Most commonly available servers operate on a general-purpose OS. Many security issues can be avoided if the OSs underlying the servers are configured appropriately. Because manufacturers are unaware of each organization‘s security needs, server administrators need to configure new servers to reflect their organizations‘ security requirements and reconfigure them as those requirements change. The practices … Read more

WINDOWS VULNERABILITIES AND THREATS

WINDOWS VULNERABILITY OVERVIEW The family of Windows Operating systems supports a wide variety of services, networking methods and technologies. Many of these components are implemented as Service Control Programs (SCP) under the control of Service Control Manager (SCM), which runs as Services.exe. Vulnerabilities in these services that implement these Operating System functionalities are one of … Read more

Quick Sort Algorithm

sorting algorithm

Quick Sort Algorithm There are may versions of Quick sort, which is one of the most popular sorting methods due to its speed (O(N lgN) average, but O(N^2) worst case). Here’s the steps to follow: Pick a “pivot” item Partition the other items by adding them to a “less than pivot” sublist, or “greater than … Read more

APPLICATIONS OF FIREWALL & FIREWALL EVASION TOOLS

APPLICATIONS OF FIREWALL There are three application of firewall: NAT- There are many ways to implement a firewall, but the most popular for both hardware and software routers is Network Address Translation or NAT. Most inexpensive routers use NAT as the means to share one IP address among many computers. NAT also provides a natural … Read more

FIREWALL

“FIREWALL SECURITY” A firewall is a structure intended to keep a fire from spreading. Buildings have firewalls made of brick walls completely dividing sections of the building. In a car a firewall is the metal wall separating the engine and passenger compartments. Internet firewalls are intended to keep the flames of Internet hell out of … Read more