Differences Between Wireless And Wired LANs

WLANs use Radio Frequencies (RF) instead of cables at the physical layer and MAC sublayer of the data link layer. WLANs share a similar origin with Ethernet LANs. The IEEE has adopted the 802 LAN/MAN portfolio of computer network architecture standards. The two dominant 802 working groups are 802.3 Ethernet, […]

Guidelines For Ensuring Credit Card Safety

  In my previous article, I talked about how online shopping has made life easy for people making transactions online. Despite the fact that it is very easy to make transactions online using credit and debit cards, you need to follow some guidelines in order to secure your funds.   […]

Some Facts To Know Virtual LANs Generally

  Within a switched internetwork, VLANs provide segmentation and organizational flexibility. VLANs provide a way to group devices within a LAN. A group of devices within a VLAN communicate as if they were connected to the same network segment. VLANs are based on logical connections, instead of physical connections.   […]

Health Benefits Of Kedi V-CA Tablet

  Kedi V-Ca Tablet is a nutritious way of adding to the body’s supply of Vitamin C and calcium V-Ca drink is a perfect way to start your day. In this article, I want to talk about some of the health benefits of this exciting product. Health Benefits:  V-Ca facilitates […]

Suicide Forbidden. RCCG Sunday School Students

  Memory Verse: “Casting all your care upon Him, for He careth for you”-1 Peter 5:7.  Bible Passage: Romans 5:1-8.   Introduction Suicide is the act of intentionally causing one’s death and deliberately killing one’s self. Research shows that approximately 90% of people who have died by suicide were suffering […]

Health Benefits Of Kedi V-CA Tablet

  Kedi V-Ca Tablet is a nutritious way of adding to the body’s supply of Vitamin C and calcium V-Ca drink is a perfect way to start your day. In this article, I want to talk about some of the health benefits of this exciting product. Health Benefits:  V-Ca facilitates […]

Internal Link Building For SEO Success

What is link building? There are various definitions online, but the best one I have found comes from Wikipedia, which explains link building as the process of attracting links to a website from other websites.   In simpler terms, link building is how you make sure that people can find […]

Common Http And Https Exploits For Networks

  Internet browsers are used by almost everyone. Blocking web browsing completely is not an option because businesses need access to the web, without undermining web security. In this article, I want to look at common HTTP and https exploits for networks.  To investigate web-based attacks, security analysts must have […]

Understanding CIA Triad In Cyber Security

  Information security deals with protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. In this article, I will be talking about CIA Triad in cyber security. Follow me as we are going to look at that together in this article.  CIA Triad As shown […]

Understanding AAA Operation In Cyber Security

Understanding AAA Operation In Cyber Security   A network must be designed to control who is allowed to connect to it and what they are allowed to do when they are connected. These design requirements are identified in the network security policy. The policy specifies how network administrators, corporate users, […]

Securing Communications In Cyber Security: How ?

  Organizations must provide support to secure the data as it travels across links. This may include internal traffic, but it is even more important to protect the data that travels outside of the organization to branch sites, telecommuter sites, and partner sites. In this article, I want to take […]