Tuesday, October 17, 2017
InfoTech : GSM (Global System for Mobile Communications, or...
InfoTech :
GSM
(Global System for Mobile Communications, or...: GSM (Global System for Mobile Communications, originally Groupe Spécial Mobile), is a standard developed by the European Telecommunica...
GSM
(Global System for Mobile Communications, originally Groupe Spécial Mobile), is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe protocols for second generation (2G) digital cellular networks used by mobile phones. It is the de facto global standard for mobile communications with over 90% market share, and is available in over 219 countries and territories.[2] The GSM standard was developed as a replacement for first generation (1G) analog cellular networks, and originally described a digital, circuit-switched network optimized for full duplex voice telephony. This was expanded over time to include data communications, first by circuit-switched transport, then packet data transport via GPRS (General Packet Radio Services) and EDGE (Enhanced Data rates for GSM Evolution or EGPRS). Subsequently, the 3GPP developed third generation (3G) UMTS standards followed by fourth generation (4G) LTE Advanced standards, which are not part of the ETSI GSM standard. "GSM" is a trademark owned by the GSM Association. It may also refer to the initially most common voice codec used, Full Rate. GSM What is GSM? GSM (Global System for Mobile communications) is an open, digital cellular technology used for transmitting mobile voice and data services. What does GSM offer? GSM supports voice calls and data transfer speeds of up to 9.6 kbps, together with the transmission of SMS (Short Message Service). GSM operates in the 900MHz and 1.8GHz bands in Europe and the 1.9GHz and 850MHz bands in the US. GSM services are also transmitted via 850MHz spectrum in Australia, Canada and
many Latin American countries. The use of harmonised spectrum across most of the globe, combined with GSM‟s international roaming capability, allows travellers to access the same mobile services at home and abroad. GSM enables individuals to be reached via the same mobile number in up to 219 countries. Terrestrial GSM networks now cover more than 90% of the world‟s population. GSM satellite roaming has also extended service access to areas where terrestrial coverage is not available.
Monday, October 16, 2017
Wireless LAN:
AWLAN provides wireless network communication over short distances using radio or infrared signals instead of traditional network cabling. A WLAN typically extends an existing wired local area network. WLANs are built by attaching a device called the access point (AP) to the edge of the wired network. Clients communicate with the AP using a wireless network adapter similar in function to a traditional Ethernet adapter. Network security remains an important issue for WLANs. Random wireless clients must usually be prohibited from joining the WLAN. Technologies like WEP raise the level of security on wireless networks to rival that of traditional wired networks. A wireless LAN (or WLAN, for wireless local area network, sometimes referred to as LAWN, for local area wireless network) is one in which a mobile user can connect to a local area network (LAN) through a wireless (radio) connection. The IEEE 802.11 group of standards specify the technologies for wireless LANs. 802.11 standards use the Ethernet protocol and CSMA/CA(carrier sense multiple access with collision avoidance) for path sharing and include an encryption method, the Wired Equivalent Privacy algorithm. (Wireless Local Area Network) A communications network that provides connectivity to wireless devices within a limited geographic area. "Wi-Fi (Wireless fidelity)" is the universal standard for wireless networks and is the wireless equivalent of wired Ethernet networks. In the office, Wi-Fi networks are adjuncts to the wired networks. At home, a Wi-Fi network can serve as the only network since all laptops and many printers come with Wi-Fi built in, and Wi-Fi can be added to desktop computers via USB. Wi-Fi is achieved with a wireless base station, called an "access point." Its antennas transmit and receive a radio frequency within a range of 30 to 150 feet through walls and other non-metal barriers. The key hardware components of a wireless computer network include adapters, routers and access points, antennas and repeaters. Wireless network adapters (also known as wireless NICs or wireless network cards) are required for each device on a wireless network. All newer laptop computers incorporate wireless adapters
as a built-in feature of the system. Separate add-on adapters must be purchased for older laptop PCs; these exist in either PCMCIA"credit card" or USB form factors. No wireless hardware other than adapters is required to build a small local network. However, to increase the performance of network connections, accommodate more computers, and increase the network's range, additional types of hardware can be deployed such as routers and access points, antennas and repeaters.
as a built-in feature of the system. Separate add-on adapters must be purchased for older laptop PCs; these exist in either PCMCIA"credit card" or USB form factors. No wireless hardware other than adapters is required to build a small local network. However, to increase the performance of network connections, accommodate more computers, and increase the network's range, additional types of hardware can be deployed such as routers and access points, antennas and repeaters.
Friday, October 13, 2017
Thursday, October 12, 2017
DOMAIN NAME SYSTEM (DNS)
DOMAIN NAME SYSTEM (DNS)
A Domain Name System or Domain Name Service (DNS) is a network protocol whose job is to map domain names such as “gohacking.com” to its corresponding IP address like “104.28.6.51”. Since Internet is the mother of millions of computers each having a unique IP address, it becomes impossible for people to remember the IP address of each and every computer they want to access. So, in order to make this process simpler the concept of
A Domain Name System or Domain Name Service (DNS) is a network protocol whose job is to map domain names such as “gohacking.com” to its corresponding IP address like “104.28.6.51”. Since Internet is the mother of millions of computers each having a unique IP address, it becomes impossible for people to remember the IP address of each and every computer they want to access. So, in order to make this process simpler the concept of
domain names was introduced. As a result users can easily access any website just by typing their domain names in the browser’s address bas such as “google.com” or “yahoo.com” without having to remember their actual IP addresses.
However, since the network protocol understands only the IP address and not the domain names, it is necessary to translate the domain name back to its corresponding IP address before establishing a connection with the target server. This is where DNS comes in handy. Your Internet Service Provider has a DNS server which maintains a huge record of existing domain names and their corresponding IP addresses. Each time you type the URL such as “http://www.google.com” on your browser’s address bar, your computer will use
the DNS server from the ISP and translates the domain name “google.com” to its corresponding IP address to make a connection with the Google’s server. All this process will happen in a split second behind the scenes and hence goes unnoticed.
Wednesday, October 11, 2017
Ethical Hacking..
Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term "Hacker" was originated.
Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer.
Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.
A computer expert who does the act of hacking is called a "Hacker". Hackers are those who seek knowledge, to understand how systems operate, how they are designed, and then attempt to play with these systems.
Types Of hacking...
We can segregate hacking into different categories, based on what is being hacked. Here is a set of examples:
Website Hacking: Hacking a website means taking unauthorized control over a web server and its associated software such as databases and other interfaces.
Network Hacking: Hacking a network means gathering information about a network by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation.
Email Hacking: It includes getting unauthorized access on an Email account and using it without taking the consent of its owner.
Ethical Hacking: Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed.
Password Hacking: This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
Computer Hacking: This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system
Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer.
Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.
A computer expert who does the act of hacking is called a "Hacker". Hackers are those who seek knowledge, to understand how systems operate, how they are designed, and then attempt to play with these systems.
Types Of hacking...
We can segregate hacking into different categories, based on what is being hacked. Here is a set of examples:
Website Hacking: Hacking a website means taking unauthorized control over a web server and its associated software such as databases and other interfaces.
Network Hacking: Hacking a network means gathering information about a network by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation.
Email Hacking: It includes getting unauthorized access on an Email account and using it without taking the consent of its owner.
Ethical Hacking: Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed.
Password Hacking: This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
Computer Hacking: This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system
Subscribe to:
Posts (Atom)
-
AWLAN provides wireless network communication over short distances using radio or infrared signals instead of traditional network cabling...