by Dinesh Thakur Category: Services and Applications

MIME stands for (Multipurpose Internet Mail Extensions). It is widely used internet standard for coding binary files to send them as e-mail attachments over the internet. MIME allows an E-mail message to contain a non-ASCII file such as a video image or a sound and it provides a mechanism to transfer a non text characters to text characters.



 
by Dinesh Thakur Category: Services and Applications

What is FTP? One of the most popular uses of the Internet is to download files - that is, transfer files from a computer on the Internet to your computer. Many thousands of files are downloaded every day from the Internet. Most of these files are downloaded using the Internet's File Transfer Protocol, commonly referred to as FTP. This protocol can also be used to upload files from your computer to another computer on the Internet.



 
by Dinesh Thakur Category: Services and Applications

The Network News Transfer Protocol is an Internet application protocol used for transporting Usenet news articles (Netnews) between news servers and for reading and posting articles by end user client applications. Brian Kantor of the University of California, San Diego and Phil Lapsley of the University of California, Berkeley authored RFC 977, the specification for the Network News Transfer Protocol, in March 1986. Other contributors included Stan Barber from the Baylor College of Medicine and Erik Fair of Apple Computer.



 
by Dinesh Thakur Category: Services and Applications

A videoconference or video conference (also known as a video-teleconference) is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously. It has also been called 'visual collaboration' and is a type of groupware.

 
by Dinesh Thakur Category: Services and Applications

An intranet is a private computer network that uses Internet Protocol technologies to securely share any part of an organization's information or operational systems within that organization. The term is used in contrast tointernet,a network between organizations, and instead refers to a network within an organization.



 
by Dinesh Thakur Category: Services and Applications

Low cost business terminals with small antennas (generally less than 2 metres in diameter) are often termed Very Small Aperture Terminals (VSATs). These are usually perceived as being two way data terminals, though strictly speaking many of the systems used for data broadcast are really one-way VSATs. Taking the USA as an example, approximately half of all installed VSATs are only used for one way data links.

 
by Dinesh Thakur Category: Services and Applications

SSL (Secure Socket Layer) is a network layer security protocol which is responsible for ensuring security of data or messages in transit through http, ldap, smtp, imap or pop3 application layers and practically ensures a reliable end-to-end secure and authenticated connection between the client and the server over the open Internet.



 
by Dinesh Thakur Category: Services and Applications

A web server is a computer programs that delivers (serves) content, such as Web pages, using the Hypertext Transfer Protocol (HTTP), over the World Wide Web. The term Web server can also refer to the computer or virtual machine running the program. In large commercial deployments, a server computer running a Web server can be rack-mounted in a server rack or cabinet with other servers to' operate a Web farm.



 
by Dinesh Thakur Category: Security

A user remotely located must be first authenticated before accessing the network or Intranet of an organization. The authentication procedures must be built into the firewall applied to the network or Intranet for the security measures. The procedures to validate remote login or access have been described in the following lines along with their comparison and features:

 
by Dinesh Thakur Category: Security

Virtual Private Networks creates a tunnel for using a public network (such as Internet) to transfer information between client's PC and office's network. To initiate tunnel in client PC it must have VPN software to connect the ISP router (RAS). After verification of validity of user, software establishes the connection between ISP and use client machine. The data packets sent through tunnel are encapsulated by the tunneling protocol in an additional header. The additional header provides routing information so that the encapsulated payload can traverse the intermediate inter-network (Public network, i.e. Internet). When the packets arrive at destination, the VPN software strips the header off the packets (or unencapsulates the packets) and send it to its destination on the local network.



 
by Dinesh Thakur Category: Security

VPN (Virtual Private Network) Definition: VPN meaning that it is a private point-to-point connection between two machines or networks over a shared or public network such as the internet. A Virtual Private Network is a combination of software and hardware. VPN (Virtual Private Network) technology, can be use in organization to extend its safe encrypted connection over less secure internet to connect remote users, branch offices, and partner private, internal network. VPN turn the Internet into a simulated private WAN.



 
by Dinesh Thakur Category: Security

To encrypt a file or other information stored in a computer means to convert it into a secret code so that it can't be used or understood until it is decoded or decrypted. You might want to encrypt a file if it contained a secret formula for a new invention, or some financial plans that your competitors would love to know about in advance. When you encrypt something, the computer will ask you to set up a password. After that, no one will be able to make sense of the information unless they have the same password.

Encryption hides your data from curious eyes. This is a process of encoding data to prevent unauthorized person from viewing or modifying it. The main features of data encryption are:



 
by Dinesh Thakur Category: Security

Internet provides a two-way flow of traffic that may be undesirable in many organizations where some information may concern exclusively within the organization or for Intranet. Intranet is a TCP/IP network that is modeled after the Internet that only works within the organization. In order to delineate information meant only for the benefit of the organization or its Intranet and the other open to all or meant for Internet, some sorts of security measures need to be employed to control two-way flow of traffic. The measure known, as firewall is simply used for this purpose.



 
by Dinesh Thakur Category: Security

Network security is a broad topic with multilayered approach. It can be addressed at the data link layer, network layer and application layer. The issues concerned are: packet intrusion and encryption, IP packets and routing tables with their update version, and host-level bugs occurred at data link layer, network layer and application, respectively.

 
by Dinesh Thakur Category: Security

• Signature is the proof to the receiver that the document comes from the correct entity. The person who signs it takes the responsibility of the content present in the document.

• A signature on a document, when verified, is a sign of authentication; the document is authentic.

 
by Dinesh Thakur Category: Security

• Message authentication ensures that the message has been sent by a genuine identity and not by an imposter.

• The service used to provide message authentication is a Message Authentication Code (MAC).

 
by Dinesh Thakur Category: Security

• Security Hash Algorithm (SHA) was developed in 1993 by the National Institute of Standards and Technology (NIST) and National Security Agency (NSA).

 
by Dinesh Thakur Category: Security

• There are a number of popular message digest algorithms known as MDn for various values of n.

• MD5 is the most popular and is fifth in a series of message digests designed by Ronald Rivest.

 
by Dinesh Thakur Category: Security

• Cryptography is a technique to provide message confidentiality.

• The term cryptography is a Greek word which means "secret writing".

 
by Dinesh Thakur Category: Security

Network security can provide the following services related to a message and entity.

 


About Dinesh Thakur

Dinesh ThakurDinesh Thakur holds an B.SC (Computer Science), MCSE, MCDBA, CCNA, CCNP, A+, SCJP certifications. Dinesh authors the hugely popular blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps. For any type of query or something that you think is missing, please feel free to Contact us.