Computer Science Topics

Design Issues in Multiprocessor Operating System

An operating system for good performance is more difficult for shared-memory Multiprocessors as compare to uni-processors. Multiprocessors require that different issues to be considered at the time of designing. For example, the overhead of cache consistency requires careful attention to the placement of data in order to reduce the number of cache misses. Similarly, in …

Design Issues in Multiprocessor Operating System Read More »

VPN

What is a VPN? A VPN (virtual private network) is a service that creates a safe, encrypted online connection. Internet users may use a VPN to give themselves more privacy and anonymity online or circumvent geographic-based blocking and censorship. VPNs essentially extend a private network across a public network, which should allow a user to securely send …

VPN Read More »

Firewall

What is a firewall? A firewall is software or firmware that prevents unauthorized access to a network. It inspects incoming and outgoing traffic using a set of rules to identify and block threats.  Firewalls are used in both personal and enterprise settings, and many devices come with one built-in, including Mac, Windows, and Linux computers. They …

Firewall Read More »

Network Layer Security

Network layer security controls have been used frequently for securing communications, particularly over shared networks such as the Internet because they can provide protection for many applications at once without modifying them. In the earlier chapters, we discussed that many real-time security protocols have evolved for network security ensuring basic tenets of security such as …

Network Layer Security Read More »

Digital Signatures

A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. It’s the digital equivalent of a handwritten signature or stamped seal, but it offers far more inherent security. A digital signature is intended to solve the problem of tampering and impersonation in digital communications. …

Digital Signatures Read More »

Ciphers- traditional

The two types of traditional symmetric ciphers are Substitution Cipher and Transposition Cipher. The following flowchart categories the traditional ciphers: 1. Substitution Cipher:Substitution Ciphers are further divided into Mono-alphabetic Cipher and Poly-alphabetic Cipher. First, let’s study about mono-alphabetic cipher. Mono-alphabetic Cipher –In mono-alphabetic ciphers, each symbol in plain-text (eg; ‘o’ in ‘follow’) is mapped to one cipher-text symbol. No matter how …

Ciphers- traditional Read More »

SSH: What is SSH?

SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. SSH also refers to the suite of utilities that implement the SSH protocol. Secure Shell provides strong password authentication and public key authentication, as well as encrypted data communications between …

SSH: What is SSH? Read More »

DHCP

DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP. DHCP automates and centrally manages these configurations rather than requiring network administrators to manually assign IP addresses to all network devices. DHCP can …

DHCP Read More »

This website is hosted Green - checked by thegreenwebfoundation.org