Engineering Concepts Tutorials

Engineering Concepts Tutorials for UML, Operations Research, Numerical Methods and many more.
  Title / Author Reverse Sort Order Replies
Views
GSM, short for Global System for Mobile Communication, is the standard behind digital mobile phones. It has opened up a new era of digital communications, which extends beyond voice to include data. GSM was planned from the outsell to provide a full range of data and fax transmission on the move,...
0
5,211
Introduction SSL shorts for Secure Sockets Layer, a protocol developed by Netscape for transmitting private documents via the Internet. SSL works by using a public key to encrypt data that's transferred over the SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many...
0
9,701
Newspapers Internet magazines came with cover stories when Denial of service (DoS) attacks assaulted a number of large and very successful companies' websites last year. Those who claim to provide security tools were under attack. If Yahoo, Amazon, CNN and Microsoft feel victim to DoS attacks, can...
0
10,417
WAP stands for Wireless Application Protocol, a secure specification that allows users to access information instantly via handheld wireless devices such as mobile phones, pagers, two-way radios, smartphones and communicators. The idea comes from the wireless industry, from companies such as...
0
4,348
We found it necessary to devote a chapter to Trojans. Trojan's are probably the most compromising of all types of attacks. Trojans are being released by the hundreds every week, each more cleverly designed that the other. We all know the story of the Trojan horse probably the greatest strategic...
10
11,027
So, what is a cipher anyway? A cipher is an algorithm or set of algorithms that systematically convert a sender's intended message text to what appears to be meaningless text, which can be converted back to the sender's original message only by authorized recipients. The following terms and...
0
13,538
What is a firewall? A firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service. It may be a hardware device running on a secure host computer. In either case, it must have at least...
3
7,177
DoS Attack DoS stand for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. DDoS Attack DDoS stands for Distributed Denial of Service. It is an attack where multiple...
4
10,041
The term Web services describe a standardized way of integrating Web-based applications. Web services technology represents an important way for businesses to communicate with each other and with clients as well. It is a truly distributed computing model in which applications talk to one another....
0
4,257
Routing and switching can be two terms that are difficult to differentiate, so here is a simple explanation that may help to clarify things. First of all switching and routing are not the same thing. Switching involves moving packets between devices on the same network. Conversely, routing involves...
0
16,604
Hard Drives are one of the most important parts on your computer. They are also one of the most expensive. All hard drives share a basic structure and are composed of the same physical features. However, not all hard drives perform the same way, as the quality of the parts of the hard drive will...
0
6,690
Imagine a network based on inexpensive, high volume chipsets, with data rates up to 12Mbit/second and a 25 meter distance capacity, designed from the start with “plug and play” in mind. Add 5 Volt power, with up to 500mA current capacity, and compatibility with many consumer products. ...
1
14,372
Q: What are the seven layers of the OSI model? A: The layers are physical, data link, network, transport, session, presentation, and application layers. Q: In the TCP client-servel model, how does the three-way handshake work in opening connection? A: The client first sends a...
0
3,084
Net - The Net is a common term for the Internet. Netiquette - The ethical and cultural rules of using the Internet, such as not posting advertisements to Usenet discussion groups (unless they allow them), not posting the same message to several newsgroups, avoidance of 'shouting' in e-mails...
1
4,764
If you have used a computer for more than five minutes, then you have heard the words bits and bytes. Both RAM and hard disk capacities are measured in bytes, as are file sizes when you examine them in a file viewer. You might hear an advertisement that says, "This computer has a 32-bit...
1
9,371
Direct Attached Storage (DAS) Today, greater than 95% of all computer storage devices such as disk drives, disk arrays and RAID systems are directly attached to a client computer through various adapters with standardized software protocols such as SCSI, Fibre Channel and others. This type of...
0
3,396
ADSL (Asymmetrical Digital Subscriber Line) - A means of delivering high communication speeds over existing copper phone lines. Analog - The technology used by the original mobile phones. Like traditional radio broadcasts, phone conversations and information are transmitted in the form of a...
0
3,765
Using authoritative name service, DNS servers primarily advertise to the world the various records associated with the domain they serve. Because users prefer common names and networks prefer numbers, DNS servers handle the translation between what a user types in a browser—such as...
0
6,089
TLS (Transport Layer Security), defined in RFC 2246, is a protocol for establishing a secure connection between a client and a server. TLS (Transport Layer Security) is capable of authenticating both the client and the server and creating a encrypted connection between the two. The TLS...
0
4,714
A binary-safe function is a function or operation that can be performed on a binary file without modifying the contents of the file. This ensures that the file is not corrupted or mutilated by the function or operation. Binary data is encoded as a string of ones and zeros (bits), but is not...
1
6,902