Media

Today’s Time Very Popular Streaming Media

Multimedia (audio and video) files that start to play in a steady and continuous flow, almost immediately upon their downloading. In contrast, an ordinary audio/video file must be downloaded, and decompressed and saved, in its entirety before it can be played. Streaming occurs at the client (user) end where a program (usually a plug in) such as 'RealAudio' or 'CU See Me' decompresses the incoming compressed file while it is being downloaded, and sends…
Internet

One Most Important type of Campus Area Networks (CANs)

Stands for "Campus Area Network." A CAN is a network that covers an educational or corporate campus. Examples include elementary schools, university campuses, an corporate buildings.  Campus Area Networks (CANs): A campus area network is larger than a local area network LAN since it may spar multiple buildings within a specific area. Most CANs are comprised of several LAN connected via switches and routers that combine to create a single network. They operate similar…
Web 2.0

What is a Web 2.0 technology?

Web 2.0 is the business revolution in the computer industry caused by the move to the internet as a platform, and an attempt to understand the rules for success on that new platform."-Tim 0' Reilly. It's a simply improved version of the first world wide web, characterized specifically by the change from static to dynamic or user-generated content and also the growth of social media. What is a Web 2.0 technology?When it comes to…
Internet

Most Important The Internet: Key Technology Concept In This Time

 The Internet: Key Technology Concept: Following are the three extremely important concepts that are the basis for understanding the Internet: (1) Packet switching. (2) The TCPIP communications protocol (3) Client/server computing Packet Switching: Packet switching is a connectionless network switching technique. Here, the message is divided and grouped into a number of units called packets that are individually routed from the source to the destination. There is no need to establish a dedicated circuit…
Potentially

How To Use Potentially Unwanted Programs in 2024

A potentially unwanted program (PUP)- is a piece of software that is also downloaded When a user downloads a specific program or application. PUP is similar to malware in that it will cause problems when it is downloaded and installed. Generally, PUPs have undesirable effects on a user's computer. Once downloaded, a PUP may run background processes that slow the computer down, or it may display annoying advertisements. The sole purpose of these applications…
Attack

How to Spoofing and Spam Web Sites Attack in 2024

involves attempting to hide a true identity by using someone else's e-mail IP address Spoofing can apply 3 can apply to emails, phone calls, and websites,, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP) or Domain Name System (DNS) server. Spoofing can be uses to access to a target's personal information, spread malware through infected links attachments, bypass network access controls, or redistribute traffic to…
search engine

Unique Value for Search Engine in 2024

A search engine is a web-based tool that enables users to locate information on the World Wide Web. Popular examples of search engines are Google, Yahoo!, and MSN Search. Search engines utilize automated software applications (referred to as robots, bots, or spiders) that travel along the Web, following links from page to page, site to site. The information gathered by the spiders is used to create a searchable index of the Web.  Search Engines:…
campus

What is the Advantage and Disadvantage of Email in 2024

The way people have been doing is completely changed since the use of email. Now, it is very less time consuming to send someone the message or text about the details of the project. Advantages of Email: Ease of Use:Quickness: Inexpensive:Filtering: Security:Disadvantages of Email: Communication:Misunderstanding:Time-consuming:Vulnerability:Instant messaging:-How instant messaging works:Features of instant messaging: Advantages of Email: The way people have been doing is completely changed since the use of email. Now, it is very less time consuming to…
SOLUTIONS

Unique way to Technology Solutions in 2024

 TECHNOLOGY SOLUTIONS: Today's threat landscape is dynamic. The wealth of disruptive technologies solutions mobile, social, cloud and big data has been increasingly impacting protect strategies. These technologies will continue to add to the complexity and security needs of the IT infrastructure and information assets. They will challenge integrity of current security controls and will risk enterprise data solutions tellectual property (IP). Thus, it's important that businesses have a start deliver effective enterprise security risk…
virus

THE TENSION BETWEEN SECURITY AND VIRUS

There are inevitable tensions between security and case of virus. When traditional merchants are so fearful of thieves that they do business in shops locked behind security gates, ordinary customers are discouraged from walking in. The same can true with respect to e-commerce. In general, the more security measures added to a e-commerce site, the more virus difficult it is to use and the site become slower. In short too much security virus can…