Skip to main content

Networking and Security

Security refers to providing a protection to computer system. Computer system must be protected against unauthorized access, malicious access to system memory, viruses, worms etc.


A security goals defines the operations that can be executed by a system while still preventing unauthorized access.


Security Requirements


The main security requirements are


Authorization: It allows to access for those users, which are related to the system.


Authentication: It refers to verifying each user of the system. OS generally authenticate users using username/password, user card, finger print, eye retina etc.


Privacy/Confidentiality


Ensure that personal information is not being accessed by unauthorized parties.


Integrity

Ensuring that the data has not been tampered with.


Unix system provides a special login name for the exclusive use of the administrator called as root.


Its password is generally set at the time of installation of the system and has to be used for login.


The root is the user name or account that by default has access to all commands and files on a Linux or other Unix-like operating system.


It is also referred to as the root account, root user, and the superuser. Root user has complete access to all files and commands.


Linux Users


Linux root user If more than one person use a single a system, then everyone may have their own user account.


Who: The who command gives the information about the users logged on to the system.


Who am i: This command displays the information about the current user only.


Su: the su command allows you to run a shell as another user. Any user can acquire superuser status with su command he/she knows the root password.


Su to root: This command is used to change the user to root when you know the root password.


sudo command : in Linux sudo (Super User DO) command in Linux is generally used as a prefix of some command that only superuser are allowed to run.


If you prefix sudo with any command, it will run that command with proper permissions to execute a command as the superuser. This is the equivalent of “run as administrator”.


These users who can use the sudo command need to have an entry in the sudoers file located at “/etc/sudoers”.


By default, sudo requires that users authenticate themselves with a password which is the user’s password, not the root password itself.


Working with Password


Passwd command is used to change the user password Syntax: #passwd Entering just passwd would allow you to change the password.

After entering password you will receive the following three prompt Current password: ******** New Password: ******* Conform New Password: ****** SSH, or Secure Shell, is a remote administration protocol that allows users to control and modify their remote servers over the Internet.


SSH or Secure Shell is a network protocol that provides administrator with a secure way to access a remote computer.


Unerstanding SSH


SSH establishes a cryptographic secure connection between two parties (Client and Server), authenticating each side to the other, and passing commands and output back and forth.


SSH is powerful, software based approach to network security that provides a secure channel for data transmission through a network.


The SSH command consists of 3 distinct parts: ssh {user}@{host} The SSH key command instructs your system that you want to open an encrypted Secure Shell Connection. {user} represents the account you want to access.


{host} refers to the computer you want to access. This can be an IP Address (e.g. 244.235.23.19) or a domain name (e.g. www.xyzdomain.com).


Host refers to the remote server you are trying to access, while the client is the computer you are using to access the host.


Symmetric Encryption


Symmetric encryption is a form of encryption where a secret key(Public key) is used for both encryption and decryption of a message by both the client and the host. Effectively, any one possessing the key can decrypt the message.


What is a Computer Network


Computer Network is a group of computers connected with each other through wires, optical fibres or optical links so that various devices can interact with each other through a network.


The aim of the computer network is the sharing of resources among various devices.


In the case of computer network technology, there are several types of networks that vary from simple to complex level.


Features Of Computer network:

  • Communication speed
  • File sharing
  • Back up and Roll back is easy
  • Software and Hardware sharing
  • Security
  • Scalability

Internet Protocol


A network protocol defines rules and conventions for communication between network devices.


Network protocols include mechanisms for devices to identify and make connections with each other, as well as formatting rules that specify how data is packaged into sent and received Protocol is a set of rules that dictate how data should be delivered over the public network (Internet).


HTTP(Hypertext Transfer Protocol)


Hypertext Transfer Protocol provides a network protocol standard that web browsers and servers use to communicate. You see HTTP every day because when you visit a website the protocol's written right in the URL (e.g. http://www.google.com).


HTTP is a communication protocol. It defines mechanism for communication between browser and the web server. It is also called request and response protocol because the communication between browser and server takes place in request and response pairs.


HTTP is the protocol to exchange or transfer hypertext. A web browser may be the client submits an HTTP request message to the web server.


The server, which provides resources such as HTML files and other content as a response message to the client.


HTTP is stateless protocol. In other word, the current request does not know what has been done in the previous request HTTP defines that how browser communicate with web server HTTP defines methods for the client-server communication


Features of HTTP


Connectionless protocol


HTTP is a connectionless protocol. HTTP client initiates a request and waits for a response from the server. When the server receives the request, the server processes the request and sends back the response to the HTTP client after which the client disconnects the connection.


The connection between client and server exist only during the current request and response time only.


Stateless


HTTP is a stateless protocol as both the client and server know each other only during the current request. Due to this nature of the protocol, both the client and server do not retain the information between various requests of the web pages.


FTP(File Transfer Protocol)


FTP stands for File transfer protocol. FTP is a standard internet protocol provided used for transmitting the files from one host to another.


It is mainly used for transferring the web page files from server to other computers on the internet.


It is also used for downloading the files to computer from other servers. FTP client is a program that implements a file transfer protocol which allows you to transfer files between two hosts on the internet.


It allows a user to connect to a remote host and upload or download the files. FTP allows us to transfer the files back and forth.


TCP/IPProtocol


Transmission control protocol is used for communication over a network In TCP data is broken down into small packets and then sent to the destination Ip is addressing protocol provides a standard set of rules for sending and receiving data over the Internet.


IP is making sure packets are transmitted to the right address.


The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.


Data traversing the Internet is divided into smaller pieces, called packets. IP information is attached to each packet, and this information helps routers to send packets to the right place.


Every device or domain that connects to the Internet is assigned an IP address, and as packets are directed to the IP address attached to them.


DNS is what lets users connect to websites using domain names instead of IP addresses.


The Domain Name System (DNS) is the phonebook of the Internet.


DNS


Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources.


Each device connected to the Internet has a unique IP address which other machines use to find the device.


DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).

Comments

Trending⚡

Understanding link.click() in JavaScript

Hey! Today i am going to share with you how to use link.click() function in javascript As a JavaScript developer, you may come across the need to programmatically click a link on a web page. The link.click() method is a commonly used way to do this, and it is important to understand how it works and when to use it. What is link.click()? link.click() is a method that can be used to simulate a click on a link element in JavaScript. It is typically used when you want to trigger a link click event programmatically, rather than requiring the user to physically click the link. How to use link.click() Using link.click() is relatively straightforward. First, you need to select the link element you want to click using a DOM selector such as getElementById() or querySelector(). Then, you can call the click() method on the link element to simulate a click. Here is an example: // select the link element const myLink = document.getElementById('my-link'); // simulate a cl...

How to Create Studio Ghibli-Style AI Images on ChatGPT for Free

How to Create Studio Ghibli-Style AI Images on ChatGPT for Free AI-generated art is making waves across the internet, captivating audiences with stunning, ethereal visuals inspired by the iconic animation style of Studio Ghibli . These AI-crafted images, from dreamy landscapes to expressive characters, reflect the timeless magic of Hayao Miyazaki ’s beloved films such as Spirited Away , My Neighbor Totoro , and Howl’s Moving Castle . Thanks to recent advancements in AI technology, particularly OpenAI ’s latest ChatGPT update, users can now create their own Studio Ghibli-inspired illustrations effortlessly by entering simple text prompts. This exciting feature is transforming digital art creation and making it accessible to both professionals and beginners. In this article, we’ll guide you through creating Ghibli-style AI images using ChatGPT and explore free alternatives for users who don’t yet have access to this feature. Ghibli AI generator free Step-by-Step Guide: How to Crea...

Value Model vs Reference Model

Value Model vs Reference Model In programming languages, two different models are used for variables.  These are:  Value Model  A variable contains a value. The name of the variable gives its value.  Reference Model A variable contains (say y) refers to another variable (say x) with a value. The variable ‘y’ is used to access the value of ‘x’ indirectly.  The ‘C’ language is based on value model. However, by using pointers, we can implement the reference model. The pointer is used to access the value of a variable indirectly. Also Read Static and Dynamic Memory Allocation Memory Leak and Dangling Pointer Memory Allocation for 2D Array Dynamic Memory Allocation Pointer Constant and Constant Pointer Pointer Declarations and their Meanings Functions and Pointers Initializing Pointer to Pointer Pointer to Pointer Multiple Indirection Relationship between Array and Pointer Pointer to Array Pointer Arithmetic Types of Pointer Illustrat...

How to write programs in Bhai language

Bhai Language Bhai language is fun Programming language , with this language you can makes jokes in hindi. Bhai language written in typescript. It's very funny , easy and amazing language. Keywords of this language written in Hindi . Starting and ending of the program Start program with keyword " hi bhai " and end with " bye bhai ". It's compulsory to add this keyword before starting and end on the program. You write your programming logic inside this hi bhai and bye bhai . How to declare variables in Bhai language We use " bhai ye hai variable_name" keyword for declaring variables. In javascript we use var keyword for declaring variables but here you have to use " bhai ye hai " keyword. If you are declaring string then use " " double quotes. You can use Boolean variable like sahi and galat for true and false . How to print output in Bhai language You have to use " bol bhai " keyword for ...

ChatGPT Now Allows Free Users to Create Ghibli-Style AI Images – Here’s How

OpenAI has finally expanded its native image generation feature to free ChatGPT users, allowing them to transform images into stunning Studio Ghibli-style artwork . While the company has yet to make an official announcement, multiple tests using free ChatGPT accounts confirm that the feature is now accessible without requiring a paid subscription. Ghibli AI Images Now Available for Free Users Previously, OpenAI restricted its image generation capabilities to ChatGPT Plus, Pro, and Team users. This led free-tier users to seek alternatives like xAI’s Grok and Google’s Gemini . However, these tools often lacked the same level of detail and artistic refinement as OpenAI’s model. Now, with the rollout extending to free users, everyone can experience the magic of Ghibli-style AI transformations. How to Create Ghibli-Style AI Images with ChatGPT If you want to turn your photos into Ghibli-inspired masterpieces, follow these simple steps: Visit ChatGPT – Open the ChatGPT website or...

Quiz tells you what type of wife you want

What Type of Wife are You Looking For? Attend this quiz and know your wife expections Quiz reveals type of wife you expect, lets answer carefully... Personality Questions: 1. What type of personality are you looking for in a wife? Quiet and reserved Outgoing and social Intelligent and witty 2. What type of sense of humor are you looking for in a wife? Dry and sarcastic Witty and clever Playful and silly 3. What type of interests are you looking for in a wife? Intellectual and educational Creative and artistic Athletic and outdoorsy Values Questions: 4. What type of family values are you looking for in a wife? Traditional and conservative Open-minded and progressive Balanced and equal 5. What type of political views...