The purpose of a rootkit is to gain privileged access to a device while concealing itself from detection by system administrators or security software. A…
Networking
What action will an IDS take upon detection of malicious traffic?
When an Intrusion Detection System (IDS) detects malicious traffic, it can take several actions based on its configuration and the severity of the threat detected….
Traffic flows: North-South and East-West
In a computer network, “north-south” and “east-west” traffic flows refer to the direction of data traffic between different entities in the network. North-south traffic refers…
PSU, MDF, PDU and IDF
Here are some examples and brief explanations of PSU, MDF, PDU, and IDF: PSU stands for Power Supply Unit. It is a hardware component that…
What is SSL accelerator?
An SSL accelerator, also known as SSL offload or SSL termination, is a specialized hardware device or software application that offloads the processing of Secure…
Difference Between Jumbo Frame and Giant Frame
Jumbo frames and giant frames are both related to the maximum transmission unit (MTU) of a network. However, there is a difference between them: Jumbo…
Types of routing protocols
Routing protocols are a set of rules and protocols used by routers to determine the best path for forwarding data packets between networks. There are…
Example of how a proxy server can be used
Let’s say you’re an employee of a company that has a strict internet usage policy, which restricts access to certain websites. However, you need to…
In few words, what is Asymmetric Routing?
Asymmetric routing is a network traffic flow in which the outgoing and incoming traffic for a communication session takes different paths through the network. In…
‘RIP’, one of the oldest routing protocols
RIP (Routing Information Protocol) is a distance-vector routing protocol used in computer networking to enable routers to exchange information about the best path to reach…