Skip to main content

Internet Terminology


ASYMMETRIC COMMUNICATIONS:
Asymmetric communication refers to the type of communication in which the speed or quality of data transfer is different in both the directions. This usually happens when browsing the Internet. The traffic coming into the user's system is very high as compared to the traffic leaving the system. In the case of symmetric communication, the transfer speed in both the directions is the same. This occurs when people communicate through video conferences or the telephone.

NUKING:
Nuking is a hacker's technique of causing the Windows operating system to crash, or suddenly terminate by using malicious network data packets. An out of band network packet that the operating system can't process is sent to the target system. This packet is called a 'blue bomb', or 'WinNuke' when Windows crashes, you see the dreaded BSOD (blue screen of death). Blue bombs are sometimes sent by multiplayer gamers about to lose a game, or by an IRC (Internet Relay Chat) user, as a show of superiority.

PHREAKING:

Hacking a phone system with the help of a computer, in order to make free calls, or charge your calls to someone else is called phreaking. This illegal activity is mainly done by computer electronics hobbyists, out of sheer curiosity, or just to save money on long distance calls. A person who actively enjoys phreaking is known as phreak or phreaker. The tools used by a phreaker are electronic devices known as boxes the black box, red box, beige box and clear box.

SPOOFING:
Spoofing is a forgery of an e mail so that the message appears to have been delivered from someone or somewhere other than the original source. The header of the email is modified in a way that the email doesn't contain information about the original sender and the address from where it was sent. The main protocol used for sending e mail, Simple Mail Transfer Protocol (SMTP), does not include any sort of authentication mechanism. This is why spoofing can be widely used on the net. Spammers often use spoofing to get recipients to open.


NETIQUETTE:

The word netiquette has been coined from the two words Network and Etiquette. Etiquette can be described as a set of rules or guidelines, which define socially acceptable behaviour. So to put it simply, netiquette is etiquette for online communication. Netiquette comprises an informal code of conduct, general dos and don'ts which should be observed. Keep in mind that online communication may be through a computer, but it is still between real people, so common courtesy and understanding should be observed. There are some additional things to keep in mind. For example typing in all capitals, gives the impression of shouting, and is thus rude. Spam is also a definite NO.

DYNAMIC HOST CONTROL PROTOCOL:

Every computer system on a TCP/IP network is assigned a unique address known as IP address to identify a computer on the network. As the network grows, the network administrator has to keep track of the addresses given to the systems. This becomes even more complex when systems are added or removed from the network. Hence, DHCP is used to dynamically assign IP addresses to computers on a network. Instead of the network administrator, a DHCP server keeps track of the IP addresses assigned. Hence, a system joining a network is assigned an IP address from an IP pool. That IP address is retrieved back to the pool when the system is removed. The IP address assigned to a system changes every time it boots up and gets connected to the network.

HOP:
In a packet switching network, a message is broken down into packets and transmitted over the network. This packet travels through several routers before reaching the destination node. The number of routers that the packet passes through is known as the hop count. This information is added to the packet header once it crosses a router. A packet with a higher hop count takes more time to reach its destination, and packets with extremely high hop counts are removed from the network, as it could be a stray packet wandering around the location.

For More Details Check ::
netlingo
webopedia

Comments

Popular posts from this blog

Future of AI

  The Future of Artificial Intelligence Artificial intelligence (AI) is one of the most important technologies of our time. It is already having a major impact on our lives, and its influence is only going to grow in the years to come. AI is already being used in a wide variety of applications, including: Natural language processing: AI is used to understand human language, which is essential for applications like speech recognition and machine translation. Image recognition: AI is used to identify objects and patterns in images, which is used in applications like facial recognition and self-driving cars. Machine learning: AI is used to train machines to learn from data, which is used in applications like fraud detection and spam filtering. These are just a few examples of the many ways that AI is being used today. As AI continues to develop, it will be used in even more applications, and its impact on our lives will only grow. So what does the future hold for AI? Here are a few predic

Are CRED Rewards a Sham?

  CRED is a fintech startup that offers a credit card bill payment app. The app is designed to make it easier for users to pay their credit card bills on time and earn rewards. However, there are some concerns that CRED may not be good for consumers. One concern is that CRED encourages users to spend more money than they can afford. The app uses gamification and social media to create a sense of competition among users. This can lead to users spending more money in order to climb the leaderboard and earn rewards. Another concern is that CRED's rewards program is not as generous as it may seem. In order to earn the most rewards, users need to pay their credit card bills on time and in full. However, many users may not be able to do this, especially if they are struggling to make ends meet. Finally, CRED's privacy policy has been criticized for being too vague. The policy states that CRED may share user data with third-party partners, but it does not specify which partners or wha

T Shirt Quotes related to Computers

Last week while searching for some computer related quotes for T Shirt I came across certain quotes that I thought were very good.So I thought why not share these quotes with you.So here are these quotes,pick the one you like or if you have any of your favorites then do share it with us.Here is the list.. "Programmers don't byte, they nibble a bit" "To iterate is human, to recurse divine" " first 90% of the code accounts for the first 90% of the development time. The remaining 10% of the code accounts for the other 90% of the development time" "99% of all girls are beautiful, the rest 1% are in my college "ASC!! a stupid question,get a stupid ANS!" "In cartooned form Atom1 - I have lost an electron. Atom2 - Are you sure? Atom1 - I am positive." "There's no place like 127.0.0.1 (“Home” for the non-geeks)" "YouTube(logo) myspace(logo) and I'll Google(logo) your Yahoo(logo)." " I'm a progr