Reverse Proxy
    What is Reverse Proxy? Reverse Proxy is a server that is positioned in front of webservers. As a cybersecurity professional, you would place a reverse proxy typically behind the firewall in your private network and it would direct client requests to the appropriate backend server. And in this position, your reverse proxy is able to intercept your users' requests and then it would forward them to the intended 'Origin' webserver. When the origin server sends a reply, the reverse proxy takes...
    By Awoke Tes 2023-12-30 13:21:13 0 2242
    Scammer
    When it comes to dealing with scammers on social networking platforms, here are some key general understandings to keep in mind: 1. Be cautious of suspicious profiles: Scammers often create fake profiles to deceive unsuspecting users. Look out for profiles with limited information, few or no friends, or inconsistent details. 2. Protect your personal information: Never share sensitive information such as your address, phone number, or financial details with anyone you don't trust. Be...
    By Amelmasin Faris 2023-09-02 12:01:24 3 2267
    Difference between TCP/IP and OSI Model
    lets know it
    By Ashu Abie 2023-08-25 05:41:53 3 2597
    D/ce B/n Https & Http
    Http and Https
    By Ashu Abie 2023-08-22 06:10:24 3 1115
    HTTP & HTTPS
    https://www-geeksforgeeks-org.cdn.ampproject.org/v/s/www.geeksforgeeks.org/difference-between-http-and-https/amp/?amp_gsa=1&amp_js_v=a9&usqp=mq331AQIUAKwASCAAgM%3D#amp_tf=From%20%251%24s&aoh=16925252072664&referrer=https%3A%2F%2Fwww.google.com&ampshare=https%3A%2F%2Fwww.geeksforgeeks.org%2Fdifference-between-http-and-https%2F
    By Ashu Abie 2023-08-20 09:57:06 3 1999
    Networking devices
    Switch: A switch is a networking device that connects devices on a local area network (LAN) by using packet switching to forward data to the destination device. It operates at the data link layer of the OSI model and is used to create and manage communication paths between devices on a network.   Firewall: A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between an internal...
    By Amelmasin Faris 2023-08-19 19:40:28 3 887
    How does DNS spoofing happen?
    A hacker alters IP addresses attached to domains in a DNS server with a fake DNS entry. A user attempts to navigate to a specific domain, and the DNS server sends them to the IP address associated with that domain. That’s how DNS poisoning or spoofing works: A hacker alters IP addresses attached to domains in a DNS server with a fake DNS entry. A user attempts to navigate to a specific domain, and the DNS server sends them to the IP address associated with that domain. The hacker...
    By Ashu Abie 2023-08-17 05:56:27 3 2157
    What is ping?
    A ping (Packet Internet or Inter-Network Groper) is a basic Internet program that allows a user to test and verify if a particular destination IP address exists and can accept requests in computer network administration.  
    By Ashu Abie 2023-08-17 05:43:44 3 867
    What is the benefits of DNS
    The Domain Name System allows you to access remote systems by entering human-readable device hostnames rather than IP addresses. DNS works by creating a mapping between a domain name, such as “www.alliedtelesis.com”, and its IP address. These mappings are held on DNS servers. DNS translates meaningful domain names into IP addresses for networking equipment to locate and address these devices. The benefits of DNS are that domain names: can map to a new IP address if the...
    By Ashu Abie 2023-08-16 05:03:41 3 1842
    #Subnetting, #CCNA, #Cisco
    Subnetting
    By Ashu Abie 2023-08-15 03:11:01 3 1706
    Ipv4 and ipv6
    Networking 
    By Ashu Abie 2023-08-13 09:23:50 3 1467
    Private IP and Public IP
    D/ce b/n Private IP and Public IP 
    By Ashu Abie 2023-08-13 08:49:45 3 1246
More Articles
Read More
Stolen phone tracking technology
Safaricom Kenya is the first that launched a technology that tracked stolen phone and recovered...
By Okello Okway 2023-09-29 07:35:47 3 909
Network
Network access is still un solved problem of many remote areas of the country 
By Faruk Abatemam 2023-12-14 18:01:33 2 2223
Phone sensors
Phones sensors
By Okello Okway 2023-09-29 11:54:26 3 920
How to create a Radar Chart in Windows 11/10
In this post, we are going to show a complete guide to create a Radar Chart in Windows...
By Chimdesa Diriba 2023-08-30 12:04:02 3 2072
Telebirr
Telebirr mela credit service ytekemalu accounto aladg blotal ybdr metenos zktegna new lehulum...
By Aster Seba 2024-01-18 07:38:40 7 1439