Skip to main content

Posts

Showing posts from 2017

Domain Name Server(DNS)

Domain Name Server(DNS) What is DNS? Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.  There are three different parts of a domain name that assign meaning to the domain. Domain name:  Bluehost is the domain name in bluehost.com. Top-level domain:  This is the suffix at the end of the URL. Examples include .com, .org, or .blog. Subdomain:  This is a prefix that further classifies a domain, such as subdomain.bluehost.com. How does Domain work? To start a website, you need a domain name, but don’t worry. It’s easy! Bluehost provides you with a free domain name when you purchase hosting. As soon as you select your hosting package, Bluehost will instruct you to choose your domain name. You can select your domain name and your  top-level domain . As long as each part of the domain name is unique, you can pick any domain name...

Firewall

Firewall What is Firewall? A firewall is a network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic. A firewall acts as a barrier between a trusted network and and an untrusted network. A firewall controls access to the resources of a network through a positive control model. This means that the only traffic allowed onto the network is defined in the firewall policy; all other traffic is denied. Types of Firewall: Software Firewall Hardware Firewall Software Firewall here are two main advantages that software firewalls have over hardware ones. The first is that software firewalls can monitor outgoing data traffic. Not only does this prevent a computer from becoming a bot or a zombie, but also it can prevent computers from broadcasting any other malware, such as worms or  computer viruses . The other advantage is that software firewalls are customizable. These programs can be adjus...

VIM

VIM Vim is an advanced text editor that seeks to provide the power of the de-facto Unix editor 'Vi', with a more complete feature set. It's useful whether you're  already using vi  or  using a different editor . Users of Vim 5 and 6 should consider upgrading to Vim 7. The main advantages of Vim 6 compared to Vim 5 can be found on  this page .      What Is Vim? Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems. Vim is often called a "programmer's editor," and so useful for programming that many consider it an entire  IDE . It's not just for programmers, though. Vim is perfect for all kinds of text editing, from composing email to editing configuration files. Despite what the above comic suggests, Vim can be configured to work in a very simple (Notepad-like) way, called evim or Easy Vim What Vim Is Not? Vim isn't an editor de...

UNIX and LINUX

UNIX       The base software that controls a computer system and its peripherals. In this sense, UNIX behaves in the same way that the perhaps more familiar PC operating systems  Windows  or  MacOS  behave. It provides the base mechanisms for booting a computer, logging in, running applications, storing and retrieving files, etc.       More specificially, the word "UNIX" refers to a family of operating systems that are related to one or both of the original UNIX operating systems - BSD and SystemV. Examples of modern UNIX operating systems include  IRIX (from SGI),  Solaris  (from Sun),  Tru64  (from Compaq) and  Linux  (from the Free Software community). Even though these different "flavors" of UNIX have unique characteristics and come from different sources, they all work alike in a number of fundamental ways. If you gain familiarity with any one of these UNIX-based operating systems, you w...

VPN, Proxies and Tor

VPN (Virtual Private Network) A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data. However, using a personal VPN is increasingly becoming more popular as more interactions that were previously face-to-face transition to the Internet. Privacy is increased with a VPN because the user's initial IP address is replaced with one from the VPN provider. This method allows subscribers to attain an IP address from any gateway city the VPN service provides. For instance, you may live in San Francisco, but with a VPN, you can appear to live in Amsterdam, New York, or any number of gateway cities. How does VPN works? Using VPNs, an organization can help secure private network traffic over an unsecured network, such as the Internet. VPN helps provide a secure mechanism for encrypting and encapsulating private network traffi...

Deep Web and Dark Web

Deep Web: The "dark web" is the encrypted network that exists between  Tor  servers and their clients, whereas the "deep web" is simply the content of databases and other web services that for one reason or another cannot be indexed by conventional search engines. Neither the deep web nor the dark web can be indexed, but not all that cannot be indexed is the dark web. For purposes of this question, I assume you want the dark web - that much-hyped, mysterious place that the media would have you believe is a wretched hive of scum and villainy where you'd be well-served to shoot first if you hope to survive. Activists will tell you it's our last, best hope for privacy and free speech, all alone in the night. As with most things, the truth falls somewhere in between. But you didn't come here for analysis, you came here for instructions. Fair enough. First of all, if you want anyone who matters to take you seriously, drop the "dark/dee...