LATEST ARTICLES

HANDLING INTRUSION ATTACK USING IDS AND IPS

HANDLING INTRUTION ATTACK USING IDS AND IPS In this paper one technology will be discussed to handle intrusions in a network. The...

OSI LAYER

Before we go to the OSI principle, do you know what OSI is? Open Systems Interconnect (OSI) Layer is a communication standard that is applied in computer networks. That standard is what...

Trojan Virus

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying...

Grab Wheels: new modes of transportation that are environmentally friendly

Grab Wheels is an electric scooter rental service, aka e-scooters for short distance travel. This service was first launched at The Breeze, BSD, Tangerang...

History of the Fifth Generation Computer

The fifth generation of computers, which is currently being developed, is being developed by various electronic vendors. The fifth generation computer is often called the next generation of...

ANTENNAS !

An antenna is a device through which radio frequency (RF) energy is coupled from the transmitter to the outside world and, in reverse, to the receiver from...

Cisco Packet Tracer, how important is that?

Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users...

WannaCrypt-ransomwareDownload

Light-Fidelity. Did you know?

How LiFi works Unlike WiFi, which uses radio waves to wirelessly transmit data, LiFi uses light; by modulating the intensity of a light...

CCTV Camera

What Are the Different Types of CCTV Camera? When it comes to securing your business, there are many different types of...