Get Mystery Box with random crypto!

Computer hardware and networking

Logo of telegram channel rudrajangraitsolution — Computer hardware and networking C
Logo of telegram channel rudrajangraitsolution — Computer hardware and networking
Channel address: @rudrajangraitsolution
Categories: Technologies
Language: English
Subscribers: 5.24K
Description from channel

RUDRA JANGRA IT SOLUTION (PANIPAT)

Ratings & Reviews

3.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

0

1 stars

1


The latest Messages 2

2022-03-03 04:59:25 @rudrajangraitsolution


Different Types of Hacking Attacks

Hackers divide their attacks into different types. These types are:

Nontechnical

These techniques focus on the end-users (i.e. the people who use the target devices).Because humans have a natural tendency to trust others, hackers can break through a system’s defenses without using any electronic tool. These hackers may use “social engineering” tactics to obtain a user’s trust and gain access to a network or file. You’ll learn more about social engineering later on.

A hacker may also implement a physical attack against his target. For instance, he may break into a computer room and access one or more devices that are present. As an alternative, he may check the dumpsters in the building and try to look for useful information (e.g. passwords). Hackers refer to this approach as “dumpster diving”.

Network

Hackers can implement this kind of attack easily, since most networks are accessible through the internet. The most common forms of network attacks are:

Accessing a network using a rigged modem.

Taking advantage of vulnerabilities in digital transport mechanisms (e.g. NetBIOS).

Sending a continuous stream of requests to a network.

Rigging the system and collecting data packets to access confidential information.

Operating System

These attacks play an important role in any hacker’s toolkit. That’s because each computer has an operating system. And there are a lot of tools that you can use to crack the OS (i.e.operating system) of a computer.

There are a lot of operating systems out there. However, hackers usually focus on the most popular ones (e.g. Windows systems). Here are some of the OS attacks that you can use:

Destroying the security of a file system.

Deciphering passwords.

Attacking pre-installed authentication mechanisms.

Taking advantage of vulnerabilities in certain protocols.

Application

Some hackers utilize computer programs to attack networks. Often, a hacker gains access to a machine through a web-based application or an email-related program. The most popular members of this type are:

Sending “spam” (i.e. junk mail) to people.

Installing malware (i.e. malicious software) in target systems.

Bypassing security mechanisms (e.g. firewall) through “online” protocols (e.g. SMTP, HTTP, IMAP, etc.)

Share And Support Us
165 viewsRudra Jangra, 01:59
Open / Comment
2022-03-02 15:10:11



By me...

@rudrajangraitsolution
74 viewsRudra Jangra, 12:10
Open / Comment
2022-03-02 14:35:40 @rudrajangraitsolution


34 INFORMATICS PRACTICES - XII SOLVED PROBLEMS 1. What is a network ? Why is it needed ? Or # Mention one advantage of networking . ( Outside Delhi 2001 ) Solution . A network is an interconnected collection of autonomous computers that can share and exchange information . Major reasons that emphasize on the need of networks are : Solution . ( 1 ) Resource Sharing . Through a network , data , software and hardware resources can be shared irrespective of the physical location of the resources and the user . ( ii ) Reliability . A file can have its copies on two or more computers of the network , so if one of them is unavailable , the other copies could be used . That makes a network more reliable . ( ii ) Reduced Costs . Since resources can be shared , it greatly reduces the costs . ( iv ) Fast communication . With networks , it is possible to exchange information at very fast speeds . 2. We have studied three different types of addresses for a host in a network : the MAC ( or hardware ) address , the IP address , and the DNS address . ( a ) Describe the difference and interrelations among these addresses . ( b ) What does " address resolution " mean ? ( c ) What does " name resolution " mean , and which part of the system performs it ? ( a ) The " MAC address " ( short for Media Access Control address ) or the " Physical address " is the address of a computer in a LAN . It is actually a hardware ( NIC card ) address that uniquely identifies each node of a network . It is known only within the LAN . The IP address is the universal address . Each computer connected to the Internet has a unique IP address . The network IP numbers are assigned by the Network Information Center . The DNS address is a name for the IP address . Since numbers are difficult to remember names are used as alias . Each DNS address is formed by a hostname followed by a domain name . ( b ) Address Resolution means converting IP address to MAC address . ( c ) Name Resolution means mapping from DNS name to IP address . The computer calls the DNS ( Short for Domain Name System ) Server for the name resolution . The DNS request contains the name to be resolved and the DNS reply contains IP address for the name . 3. Given the following MAC address , can you identify its parts ? Also specify who defines / specifies these parts number ? 00 : A3 : 03 : 51 : 0E : AC Solution . The first 3 bytes of given MAC address specify the manufacturer number and the last 3 bytes of it are the network card number . Hence the given MAC address has two parts : ( 1 ) Manufacture code number ( first 3 bytes ) i.e. , 00 : A3 : 03 ( ii ) Network card number ( last 3 bytes ) i.e. , 51 : 0E : AC . The manufacture code number is assigned to the manufacturer by an agency called IEEE . The network card number is assigned by the manufacturer . What do you understand by Domain Name Resolution ? 4 . Solution . In order to be part of an internetwork ( such as Internet ) , every computer must have a unique IP address that identifies it on the network . IP address takes the form of a string of four numbers.
105 viewsRudra Jangra, 11:35
Open / Comment
2022-03-02 14:33:18 Let us Revise A wwwv A COMPUTER NETWORKING A network is a collection of interlinked computers by means of a communication system . fast communication . The networks facilitate resource sharing , increased reliability , reduced costs , and increased and Every computer needs a network card in order to become part of a network . unique hardware number on a network . The hardware address of the networks card is called MAC address , which becomes computer's 33 communication , known as IP address . When two or more networks are interconnected , they need a special type of address for > Internet is a worldwide network of computer networks . Alphabetical name of a website is called its URL ( Uniform Resource Locator ) and numbered address ( 4 parts separated by periods ) of a website is called its IP address . Internally , computer follows a mechanism to obtain IP address of a website from a URL . This mechanism is known as Domain Name Resolution . InterSpace is said to be the future of Internet . On the basis of geographical spread , networks can be classified into PAN ( Personal Area Networks ) , LAN ( Local Area Network ) , MAN ( Metropolitan Area Network ) , and WAN ( Wide Area Network ) . Small computer networks that are confined to a localised area e.g. , an office , a building etc. , are called LANS . MANS are the networks spread over city . A WAN is a group of computers that are separated by large distances and tied together . It can even be a group of LANS that are spread across several locations and connected together to look like a big LAN . The pattern of interconnection of nodes in a network is called topology . Most popular topologies are star , bus , ring , graph and mesh , tree . A modem is a computer peripheral that allows you to connect and communicate with other computers via telephone lines . A hub is a hardware device used to connect several computers together . Hubs can be either active hubs or passive hubs . A switch is a device that is used to segment networks into different subnetworks called subnets or LAN segments . A repeater is a device that amplifies a signal being transmitted on the network . A bridge is a device that links two networks together . A router is a device that works like bridge but can handle different protocols .. a A gateway is a device that connects dissimilar networks . > A protocol is a set of standardized rules for data packets , techniques for detecting and correcting errors and so on . > Networks experience a greater degree of vulnerabilities and risk because of their connectedness . Major forms of intrusion problems are : Snooping and eavesdropping . Snooping refers to unauthorized access of someone else's data , email , computer - activity , or data communication . * Eavesdropping is the act of secretly listening / intercepting someone else's private communi cation / data / information . Denial - of - Service ( DoS ) attacks are those attacks that prevent the legitimate users of the system , from accessing or using the resources , information , or capabilities of the system . a With proper network security policy and tools , the network - security threats can be effectively countered
113 viewsRudra Jangra, 11:33
Open / Comment
2022-03-01 21:19:16 If your file manager and gallery is locked then check all the files ..
227 viewsRudra Jangra, 18:19
Open / Comment