- LAN
address of the node
- Bridge
interface
- Time
stamp
- Stale
table entries
Tuesday, September 10, 2013
What are the differences between bridges and repeaters?
Posted by
Sunflower
at
9/10/2013 03:20:00 PM
0
comments
Labels: Address, Analog, Bridges, Data, Devices, Differences, Forward, Frames, Hosts, Information, Interface, Layers, Network, Networking, Packets, Physical, Repeaters, Signals, Store, Telecommunications
![]() | Subscribe by Email |
|
Thursday, June 27, 2013
What is the difference between a passive star and an active repeater in fiber optic network?
Posted by
Sunflower
at
6/27/2013 11:30:00 AM
0
comments
Labels: Active, Active Repeater, Communication, Components, Coupler, device, Differences, Fiber, Fiber Optics, Input, Mode, Network, Optical, Output, Passive Star, Properties, Signals, Store, Telecommunications, Users
![]() | Subscribe by Email |
|
Sunday, May 5, 2013
What is DRAM? In which form does it store data?
What is Dynamic Random Access Memory (DRAM)?
- Charged and
- Discharged
Posted by
Sunflower
at
5/05/2013 09:40:00 PM
0
comments
Labels: Advantages, Bits, Capacitors, Conditions, CPU, Data, Disadvantage, DRAM, Dynamic, Information, Memory, Physical, Random, Random Access Memory, States, Static, Storage, Store, Transistor, Volatile
![]() | Subscribe by Email |
|
Tuesday, April 30, 2013
What is hard disk and what is its purpose?
Hard Disk and its Purpose
Posted by
Sunflower
at
4/30/2013 08:48:00 PM
0
comments
Labels: Access, Benefits, Capacity, Characteristics, Data, Discs, Disk Drive, Drives, files, Hard Disk Drives, HDD, Information, Operating System, Performance, Random, Read, Storage, Store, System, Write
![]() | Subscribe by Email |
|
Thursday, March 7, 2013
What is meant by Holographic Data Storage?
Difference between Conventional storage methods and Holographic Data Storage
Features of Holographic Data Storage
Types of Holographic Media
- The re-writable media and
- The write once
medium.
Posted by
Sunflower
at
3/07/2013 04:40:00 PM
0
comments
Labels: Changes, Conventional, Data, Features, Format, Hologram, Holographic Data Storage, Information, Interference, Light, Media, Medium, Optical, Reading, Recording, Storage, Store, Technology, Transfer
![]() | Subscribe by Email |
|
Thursday, August 30, 2012
What is a Module? What is a Compiled Module? (In WinRunner)
What are Compiled Modules?
- Loading the module to be compiled from a test script with the help
of the TSL load function.
- Running the script of the module to be compiled with the help of the
winrunner run commands.
- Function definitions and declarations,
- External functions prototypes
- Load statements etc.
Posted by
Sunflower
at
8/30/2012 10:33:00 PM
0
comments
Labels: Application, Automated Software Testing, Automation, Compilation, Compiled Modules, Debug, Functions, Libraries, Modules, Organization, Statements, Store, Test Scripts, Tests, TSL, User-defined, Users, WinRunner
![]() | Subscribe by Email |
|
Sunday, July 15, 2012
Describe some Caching Issues?
What are different caching issues?
Tuesday, March 20, 2012
How is password cracking done?
Password as we all know is some secret string of some characters that is typically used for the authentication purpose and as a means of identity proof.
WHAT IS PASSWORD?
- Password is way through which you access your some accounts and resources.
- A password is not meant for the other except the account holder.
- Passwords have been in use since ancient history and of course the password theft or cracking also!
- Nowadays passwords are more known for their use in the log in process to various systems like an operated system, ATMs, cell phones, email accounts and so on.
- It is not necessary that a password should be some meaningful word; rather it can be anything silly that is probably difficult to be guessed by the others.
- There are many types of passwords like passphrase (password formed by more than one word), PIN (personal identification number, numerical password).
- Passwords are again very much vulnerable since they are not as secure as their cryptographic counterparts i.e., protocols.
- These days password theft, password spoofing etc is quite common.
FACTORS AFFECTING THE SECURITY OF PASSWORD
Before we explain to how a password is cracked, you should know what all the factors affect the security of a password.
- Any password protected system is provided protection against the viruses, Trojans etc.
- Physical security measures like shoulder surfing are also implemented.
- Many a times less extreme measures are also used like:
1. Side channel attack
2. Extortion and
3. Rubber hose cryptanalysis
HOW SECURITY OF PASSWORD PROTECTED SYSTEM IS DETERMINED?
- The security of a password protected system is often determined by the rate at which the attacker or hacker can guess the password.
- To overcome this threat a “time out” of a few seconds can be implemented or a fixed number of chances should be given to type in the correct password.
- Many of the computer systems are now implementing these techniques.
- In some systems the cryptographic hash of the password gets stored which makes the password accessible to an attacker.
- The attacker can obtain the actual password from this hash password value.
- Passwords with high guessing rates are commonly used for cryptographic keys generation process.
HOW PASSWORD CRACKING IS DONE?
- Password cracking is recovering of the passwords from the stored or transmitted data in a computer system.
- There are many approaches developed to crack a password:
1. Guessing
This is perhaps the most common approach and does not require any special skills.
2. Changing the password
This method is second on the list of password cracking methodologies. When a user forgets his/ her password, the system allows the changing of the password following an authentication process.
3. Brute force cracking
This type of cracking involves trying every possible password till the right one is achieved.
4. Dictionary attacks
This method is also very much common and involves trying of the candidate passwords using a cracking dictionary.
5. Pattern checking
6. Word list substitution
PURPOSE FOR PASSWORD CRACKING
- The purpose for the cracking of password can be a positive one, for example, the user of a particular account might have forgotten his password and could not access his account.
- The purpose for the cracking of password can be negative one i.e., for gaining unauthorized access to a computer system, mischief purposes etc.
Time taken to crack a password is directly proportional to the strength of its character set or bits.
- The complex a password, the longer it will take to crack it.
- In some password cracking processes, the system is made to generate the similar types of passwords.
- Such passwords are called candidate passwords.
- Password cracking rate depends on the availability of the hash and the limitations of the software authentication.
Posted by
Sunflower
at
3/20/2012 03:00:00 AM
0
comments
Labels: Approach, Attacker, attacks, Authentication, Complex, Crack, Factors, hacker, Identity, Negative, Password, Password cracking, Positive, Protection, Recover, Security, Store, Time, Transmit, Virus
![]() | Subscribe by Email |
|
Thursday, December 17, 2009
CPU Caching
The cache on your CPU has become a very important part of today's computing. The cache is a very high speed and very expensive piece of memory, which is used to speed up the memory retrieval process. Without the cache memory every time the CPU requested data it would send a request to the main memory which would then be sent back across the memory bus to the CPU. This is a slow process in computing terms. The idea of the cache is that this extremely fast memory would store and data that is frequently accessed and also if possible the data that is around it.
CPU's however use a 2 level cache system. The level 1 cache is the fastest and smallest memory, level 2 cache is larger and slightly slower but still smaller and faster than the main memory. The main problem with having too much cache memory is that the CPU will always check the cache memory before the main system memory.
Read cache is used to store copies of data and instructions that are retrieved from main memory or mass storage. If the central processing unit (CPU) needs to access the same data or instructions again, it can use the copy in read cache. This is much faster the going back to main memory or mass storage again. Write cache is a temporary store for data that needs to be written to main memory or mass storage. The CPU can move the data into cache very quickly, and then continue executing instructions. The data is subsequently moved to its permanent location by the cache controller, a process that takes more time because main memory and mass storage devices are much slower to access than cache memory.
Posted by
Sunflower
at
12/17/2009 08:13:00 PM
0
comments
Labels: Cache, Caching Memory, CPU, Data, Read, Store
![]() | Subscribe by Email |
|