Networking
What do you mean by the term cyber-attack? What is its purpose? What are the types of cyber-attacks?
- 362 views
- 2 answers
- 1 votes
What are your assessments of Facebook as they turn 11 years soon? What are the major benefits that the world at large can attributed to the success story of Facebook? I believe there are also other negative activities perform by Facebook which can also go unnoticed? Can you talk about them if you agree with me? Would you say Facebook came into the social platform at the right time or they would have done better if they emerged at a different time per your analysis?
- 591 views
- 1 answers
- 0 votes
I read an Australian research published in a local article stating that most investments and other risks done immediately after reading news on Facebook by its subscribers are tag as being financially irresponsible. The research further states “Facebook users see their online social circles as a 'cushion' against financial loss” and those subscriber and users should be careful with online investments and the likes per their information received on this platform. I therefore ask if what they claim is true, how best one can conduct himself to have an optimum info in making right decisions.
- 844 views
- 0 answers
- 0 votes
I am facing a problem since last few days while connecting to internet. My system takes a lot of time while it searches for an IP. I have asked few people and came to know that it is a problem related to DHCP. This is a relatively new term for me. Is this relates to any issue with the system. I am using a dial up connection. Can somebody please help in resolving this issue?
- 825 views
- 1 answers
- 0 votes
Do you know about the system that links together, mainframes, minis, and microcomputers that are in close proximity for the purpose of communication? What is a network that uses a server to meet the needs of the other computers on the network? Additionally, please tell me more about the best network architecture for connecting many PCs together in an office.
- 717 views
- 0 answers
- 0 votes
What is Federated Cloud? Is this a technology to move my data warehouse on cloud? If yes than can someone can explorer the steps for this? Also I have heard that there are many service providers out of which I can choose one, can someone give me details on this. What are the differences in their facilities? Is federated Cloud service costly? What type of guarantee is provided for my data security by these services?
- 647 views
- 1 answers
- 0 votes
I have decided to deploy my application on cloud setup. What steps do I need to implement regarding its architectural design? What are the common issues faced during its implementation? Can I get some kind of guidelines on it? For an example:Do I need to change my current architecture of my application? How the integration will be done from other feeds consumed by my application? How will I integrate my up streams and down streams? What should be on priority like my non-functional requirements priority?
- 686 views
- 1 answers
- 0 votes
We are planning to install switch stacks in our organization, and need to gather some information on Catalyst 3750E switch, to prepare the blueprint document. Can someone describe the software license required for this? Also I need to know on the Cisco IOS version required for it. How does information get distributed between stack master and member switches in Cisco configuration? Also please elaborate on how a stack master is created amongst the many ports.
- 951 views
- 1 answers
- 0 votes
How it can be distinguished that somebody is utilizing ssh burrow as intermediary to associating with a VPN? Does additional gear expected to put the server to DMZ? In a VPN case would a dreadful client filter a server for open ports? Additionally, where can I download free VPN software?
- 624 views
- 1 answers
- 0 votes
How do associations with a stunnel shift from SSL-VPN, if both are in progression on the same port 443, and both utilization SSL to scramble information? What is contrast between SSL-VPN and https movement setup with stunnel? At the point when SSL-VPN is blocked then how to keep secure searching on open wifi?
- 725 views
- 0 answers
- 0 votes