Posts

Showing posts from February, 2018

techifoblogger:- Ethical hacking

Image
Ethical hacking:- The term ethical hacking is mostly misunderstood by the people with the word hacker. The hacker word contains a lot of black history in the last few decades but the term ethical hacking has a different meaning connected to it. The term ethical hacking itself describes the meaning of the word i.e Ethical : with rules Hacking : to hack. The term hacker is  a called person who try to access the another persons data without having the proper permission of the owner. Or tries to access the personal files of the owner.The hacker is often called to a person who is unauthorized to access  the network of the someone  but if he still tries to get access to  network by guessing the password or by any other method. Example :- If a person found the WiFi on his device but the WiFi network is protected with a password the user still want to connect to the network and attempts to predict the password and succeed to guess the password the person wil...

techinfoblogger:- Network connnectivity

Image
Network connectivity    Network connectivity is the term used to connect two or more computers or system with one  another through the mediater mean. Network connectivity is basically  divided into two different parts  i.e wired and wireless connectivity. wired connectivity:- wired connectivity is the the connectivity between two or more computer or system using the wires . The wires is use as a media between the two computers. the connection with the wired network has the limitation with the network speed depending upon the material use in wired network.The wire connectivity includes LAN(local area network) MAN(metropolitan area network) WAN(wide area network) GAN(global area network) wireless network:-wireless network is the connection establishment between two or more computers or the system through the wireless means of communication.The wireless network technology includes. WIFI (wireless fidelity) bluetooth    LAN(loca...

TechInfoblogger;- REMOTE ACCESS CONTROL

Image
Remote access:-                                                               Definition:      Remote access:-  Remote access service offers access to a remote machine or host or server from a remote location.This technology is very useful in case if an IT administrator is away from his office or providing support from a remote location.If you have enabled the remote access on any machine or server in the network,you will be able to access that machine or server from remote location and can work remotely on it. Example :  Yash is an IT administrator for a company Remotesupportindia.com . He left for the day.While he was on the way to his home he got a call from his team. As specific service was not running properly. As the server was remote enabled, Yash could access that server remotely...

Techinfoblogger:- backup and types of backup

Image
Backup’s and types of backup In information technology, a  backup , or the process of backing up, refers to the copying and archiving of computer data so it may be used to  restore  the original after a data loss event. The verb form is to  back up  in two words, whereas the noun is  backup . Backups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups represent a simple form of disaster recovery, and should be part of any disaster recovery pla...

Techinfo blogger:- File Sharing

Image
File Sharing:- File Sharing is Technique use for send a file between two or more Computer or laptop and for sending a file both are computer must be in network. Example:-  For example one file needed to be send to another person he will use the file sharing application to deliver the file or to share the file the person can use the file sharing method. For sharing file using a FTP file transfer protocol it is a standard internet protocol for sharing large files between computers on the internet over TCP/IP connection.                                  Sometimes you may have large file sizes that cannot be shared as a attachment with your normal outlook or emails.At such a time its a good to share your files using free file sharing sites like: Dropbox We transfer Plus Transfer Mediafire  sendspace...