Categories

A sample text widget

Etiam pulvinar consectetur dolor sed malesuada. Ut convallis euismod dolor nec pretium. Nunc ut tristique massa.

Nam sodales mi vitae dolor ullamcorper et vulputate enim accumsan. Morbi orci magna, tincidunt vitae molestie nec, molestie at mi. Nulla nulla lorem, suscipit in posuere in, interdum non magna.

What is the encryption standard used for resolving wireless security issues?

Wireless is a very broad concept that involves preventing the unauthorized clients from accessing or damaging the wireless computer networks. There are two most commonly used wireless security services:

WEP or wireless equivalent privacy WPA or wi – fi protected access

– The first one i.e., the WEP is quite a weak security standard. – […]

What are mechanisms for mutual exclusion?

It is important in the processing of the processes and threads that it is ensured that any two threads or processes do not coincide with each other i.e., they both do not utilize the critical section simultaneously. Here, critical section is referred to as the duration when a shared resource is accessed by the different […]

What are best practices for VLAN Security?

Virtual local area networks or VLANs are also prone to many of the security issues. Till now a number of researches have been carried out regarding the security of the VLANs. From these researches, no intrinsic security reviews have emerged that would challenge the security of the VLANs. However, these researches do point out a […]

Explain Operating System Interface OSI Layer 5 – Session Layer

At the 5th number in the OSI model comes the session layer.

About Session Layer

– The purpose of this layer is to maintain a control over the connections that exist between the computers in a network. – It is this layer’s responsibility to create, manage as well as terminate a connection between the remote […]