Introduction to Google Account Security Nowadays, for a user it is mandatory to create a Google Account, in order to use the Gmail, Google Hangouts, Google Meet and Blogger Applications or Web Site Services. On the other hand, a Google …
Difference Between MD5 and CRC MD5 and CRC are 2 of most commonly used hashing algorithms, infact while comparing files and including other use cases. In this article. We will understand both the concepts of hashing algorithm and how one …
What is CASB? Cloud access security brokers (CASBs) is a cloud hosted solution placed between cloud service consumers and cloud service providers to implement security, compliance and governance security policies for cloud applications. CASBs help organizations to extend the security …
Before discussing the difference, let’s understand the two terms first What is HTTP? HTTP is a Hypertext Transfer Protocol. HTTP works similar to other application services like SMTP and FTP. Like the performance of FTP, it transfers a document using …
Overview Content filtering is essential to exclude access to web pages or email deemed objectionable. Content filtering is used by corporations as part of their security framework setup. Content filtering service boosts network security by blocking entry to suspicious websites …
SSL Certificate types : Intermediate Certificate and Root Certificate When we look at the function of the SSL certificates at the first glance, then we would find that they are pretty straightforward. You would simply install it to your concerned …
A digital certificate, which is also termed as public key certificate is applied to cryptographically link up the ownership of public key to the entity owning the same. Here, we are going to get a better insight of what is …
Kill switch in VPN A VPN kill switch is also known as an internet kill switch. For the VPN security solution, a VPN kill switch is a critical piece. It is considered to be the top feature for the best …
Types of Attacks on Routers It is not possible to 100% prevent the router attacks. However, there are possibilities of few things that could be done for preventing the occurrence of most common attacks of routers on the network and …
MESH NETWORK TOPOLOGY Network Topology refers to the physical or logical layout of a network. Mesh network topology is a type of site-to-site WAN topology in which each network device is connected to every other device through a dedicated link …
Security Groups in AWS I am sure that while working on Security groups, we do ponder about Firewalls and Rules i.e. allowing or denying traffic based on hardware or software firewalls. In case of AWS security groups are very similar …
What is Proxy? Proxies (often called intermediaries in the SOA world) are hardware or software solutions that sit between the client and the server and do something to requests and sometimes responses. The most often heard use of the term …
Introduction to URL Filtering Make sure that you type the name of your favorite social networking site in the web browser and it displays a message “The policy of your organization does not allow navigation to this website” and does …
Botnet(BOT) Users began to know this malicious program from the year 2000 when a teenager from Canada launched a series of denial of service attacks against very popular websites. The young man, whose nickname was Mafiaboy, attacked Yahoo, ETrade, Dell, …
For some years now, the word cyber security has become a standard among companies. Information Technology is already a common tool in business and to keep systems safe, security measures are lacking to help us avoid being exposed to large …
Equifax, Avanti or Down Jones, are sadly famous companies in 2017 for having suffered significant leaks of sensitive information. Thus, those who committed to ensuring the confidentiality of their customers, are faced with the obvious failure of wrong Data Loss …
NAT (NETWORK ADDRESS TRANSLATION) In computer networking, Network Address Translation (NAT) is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device. Network Address Translation (NAT) allows security administrators to overcome …
In this post, we shall discuss about comparison of URL filtering and Content filtering. Both the terms are interrelated, however differ in flavor of how they protect and assets they protect. SO, lets understand them in more detail – URL …
Firewalls are computer software programs that hinder illegitimate access to or from a personal network. They are used to improve security in a system of computers connected to a similar interface, including the Internet and LAN. Thus, they are a …
VPN (Virtual private Network) has become an essential part of network and security suite when it comes to secured communication over Internet. VPN forms secured tunnels between a local client and a remote server. Remote and mobile workers use VPN …
TOR (The Onion Router) is a software and open network which allows the users to browse the Web anonymously. TOR makes it difficult, if not impossible, for any snoops to see our web mail, search history, social media posts or …
Well, not always. As VPN is a new concept , so the rules are murky and open to multiple interpretations. Though all good VPN companies will do their best to protect your data, privacy, and overall security on the web, but …
Introduction to Torrenting Torrenting is a P2P (peer-to-peer) file sharing technology used to share files efficiently. This technology relies on a community of decentralized users for file sharing rather than being dependent on traditional single website or source for downloading. …
VPN (Virtual Private Network) is a technology that lets you access the web safely and privately. It acts like a secure tunnel between your device and the internet. The information traveling between a connected device (computer, smartphone, tablet) and a …
The differences between Router and Firewall are as follows – SOURCE:https://ipwithease.com Also refer Firewall vs Proxy
Virtual Private Networks (VPNs) and Proxy servers are both useful tools for improving your online privacy and security, but they serve different purposes. A VPN works by transferring your internet connection to a private server, thus making it much harder …
The differences between Proxy and NAT are as follows – SOURCE:https://ipwithease.com
The differences between Traditional Firewall Next Generation Firewall are as follows – SOURCE:https://ipwithease.com Also refer Router IOS Firewall vs Firewall
The differences between NGFW and UTM are as follows – SOURCE:https://ipwithease.com
The differences between Firewall, IPS and IDS are as follows – SOURCE:https://ipwithease.com Also refer Network Based Firewall vs Host Based Firewall
The differences between Network Based Firewall and Host Based Firewall are as follows – SOURCE:https://ipwithease.com Also refer Firewall vs IPS vs IDS
Introduction : SNAT vs DNAT In our previous post, we discussed about the NAT in detail. NAT is abbreviated for Network Address Translation, so the key word here is translation, as it is the process that is responsible for translation …
Difference between Router IOS Firewall and Firewall SOURCE:https://ipwithease.com Also refer WAF vs Network Firewall
Difference between WAF and Network Firewall PARAMETER WAF NETWORK FIREWALL Philosophy A Web Application Firewall (WAF) is a network security firewall solution that protects web applications from HTTP/S and web application-based security vulnerabilities. Network Firewall is a device which controls …
Difference between Stateless Firewall and Stateful Firewall PARAMETERS STATELESS STATEFUL Philosophy Treats each packet in isolation and does not relates to connection state Stateful firewalls maintain context about active sessions and use “state information” to speed packet processing Filtering decision …
Difference between ACL and Firewall: SOURCE:https://ipwithease.com Also refer Stateless Firewall vs Stateful Firewall
Difference between EIGRP and OSPF: EIGRP OSPF Advanced Distance Vector Routing protocol Link State Routing protocol Open standard(informational). EIGRP was converted to open standard in 2013. Open standard of IETF, supported by most vendors. Fast sub-second convergence Slower convergence than …
Comparison Table: Cisco PIX vs Cisco ASA Below table describes the difference between Cisco PIX and Cisco ASA firewalls: S No Cisco PIX Cisco ASA 1 Firewall appliance Is firewall and anti-malware security appliance 2 Physical Appliance Physical and Virtual …
MAC (Media Access Control) Address The MAC address is used by the Media Access Control sublayer of the Data-Link Layer (DLC) of telecommunication protocols. Every NIC (also called LAN card) has a hardware address that’s known as a MAC, for Media Access Control. …
OSPF uses LSAs or Link state Advertisements to share information of each network and populate the LSDB (Link State Database). The main LSA types are : LSA Type 1 (Router LSA):generated by each router for each area it is located. …
SIP i.e. Session Initiation protocol is an open source protocol. It communicates on TCP or UDP on port numbers 5060 or 5061. SIP has got a range of different messages with each having lot of additional data, thus making it …
SCCP stands for Skinny Client Control Protocol . It is a lightweight , proprietary control and communication protocol originally developed by Selsius Systems and later taken over by Cisco Systems.It is a lightweight IP-Based protocol for Signalling with CUCM and CME for Cisco …