the graphical user interface which interact between hardware and user . it performs tasks like memory management , system management and hardware management.
IPv6 (Internet protocol version 6) The INTERNET ENGINEERING TASK FORCE , IETF ( organization responsible for defining the IP standards ). In 1980's the IETF developed IPv4 but as internet explosion took place in 1990s , The TETF realized that they might need the new protocol standards for the Next generation . IPv6 is the second network layer standard protocol that follows IPv4 , it offers increased address size , a streamlined header format , extensible headers & the ability to provide confidentiality and integrity of communications. the following list summarizes the characteristics of IPv6 and the improvements it can deliver: Larger address space : Increased address size from 32 bits to 128 bits Streamlined protocol header : Improves packet-forwarding efficiency Stateless autoconfiguration: The ability for nodes to determine their own address Multicast: Increased use of efficient one-to-many communications Jumbograms: The ability to have very large packet paylo...
MANUAL BOOK FOR SHELL SCRIPTING * CLICK HERE A shell script is a computer program designed to be run by the Unix/Linux shell which could be one of the following: The Bourne Shell The C Shell The Korn Shell The GNU Bourne-Again Shell A shell is a command-line interpreter and typical operations performed by shell scripts include file manipulation, program execution, and printing text. Extended Shell Scripts Shell scripts have several required constructs that tell the shell environment what to do and when to do it. Of course, most scripts are more complex than the above one. The shell is, after all, a real programming language, complete with variables, control structures, and so forth. No matter how complicated a script gets, it is still just a list of commands executed sequentially. The following script uses the read command which takes the input from the keyboard and assigns it as the value of the variable PERSON and finally prints it on STDOUT. #!/bin/sh # Author : ...
Top 10 cyber security vulnerabilities When it comes to cyber security, it is essential to differentiate security threats to cyber security vulnerabilities. A threat is an event that could cause harm to your IT system and network assets. There can be no security threat without cyber-attacks that target your weaknesses. These weaknesses, or cyber security vulnerabilities, are areas of your security, infrastructure and business process that make your business more likely to be attacked. In 2020, it makes no doubt that vulnerabilities to your cyber security protocol are more relevant than ever to your growth, your reputation, and your income. Developing reliable cyber security strategies requires the right combination of technology and people. Indeed, as we are about to see, making sure you’ve got the best minds on board and that they can use reliable and advanced cyber security technology is not as easy as it first seems. In fact, some of the most common vulnerabilities are often the resu...
Hostel mein complete krwa dena🙄
ReplyDelete