Networks

PaaS

What is PaaS used for?

What is PaaS?

Platform-as-a-service, also commonly called PaaS, is a type of cloud computing. It is one level above reacher in functionality rather than the IaaS (infrastructure-as-a-service). It provides a great opportunity for clients. They receive an entire platform for running and developing applications. Additionally, they don’t have to take any care of the developing conditions or the whole infrastructure.

Continue reading…

FTP (File Transfer Protocol)

​What is FTP (File Transfer Protocol)?

​FTP (File Transfer Protocol) definition

FTP (File Transfer Protocol) is a communication protocol designed for file transfer between a client and a server. FTP is a standard Internet protocol and uses TCP/IP for transferring the file from one device to another. It was created in 1971 (RFC 114) by Abhay Bhushan. Later it was updated in 1980, adding the TCP/IP compatibility. Finally, and some years later, in 1985, we got to the current version.

With the time IPv6 support was added, and so was added security extension for FTP. 

FTP was used straight off the Command Prompt or Terminal in the past since there was no graphic user interface (GUI). Now, there are FTP server applications and FTP client applications, both for computers and mobile devices, that provide a GUI.

Continue reading…

TTL

TTL meaning and definition

Time is a critical factor to be considered almost for everything. Every project, business, process, fixing, etc., you try is marked by a specific time. Computing and networking are not exceptions. Lots of processes must happen in determined periods of time, actually in milliseconds, to be considered efficient and successful. 

TTL meaning and definition

The letters TTL are the initials for time-to-live. It is the value that points to the exact period of time or number of hops that data packet is configured to be alive on a network or in the cache memory. Once that time expires, or it hops the number of times, routers will discard it. There are different kinds of data-chunks, and they all work with their specific TTL. Meaning, the time such data will be held in a device to complete determined tasks or functions.  

Continue reading…

IPAM IP Address Management

What is IPAM (IP Address Management)?

Do you remember when the Internet meant a connection to a desktop computer? Later laptops came to your business, followed by tablets, printers, and all your colleagues’ smartphones, etc. Have you considered how many devices are looking for Internet connection in your business facilities right now?

And this happens daily all around the world. The number of devices grows in such a way that managing networks are getting very complex. Just IP addresses’ assignation or tracking can take a lot of time. And network administrators have so many more tasks to comply with.

To do this manually is not really a choice. In such a scenario, IP address management (IPAM) is very convenient for you.

Continue reading…

Teardrop attack

What is a Teardrop attack?

Computing technology is an exciting world that boosts creativity in different directions. Unfortunately, malicious people are part of the environment, and they constantly innovate the methods for getting fun, popularity, or profit their way. As a result, the variety of attacks is huge already. Teardrop attack is one choice of the wide attacks’ menu.

What is a DoS attack?

Denial of Service (DoS) is an attack that aims to shut down either a machine or a network by making it inaccessible to users. There are different techniques to reach that evil objective. One is via big loads of traffic for flooding the target until it gets very sluggish and finally stops working. Another, overloading with requests and data, or the sending of malicious information, bugs for exploiting vulnerabilities or destabilizing the machine or network until it crashes. 

DoS attacks have different motivations. Sometimes they are used to sabotage businesses, ask for money for the ransom of a company, protest against a political or social measure, show power, and distract the target for doing something worse like stealing sensitive data. 

What is a Teardrop attack?

Continue reading…

UDP User Datagram Protocol

What is UDP?

UDP stands for User Datagram Protocol, and it is an efficient and fast communicating protocol to exchange messages between networks and devices. 

It’s very used on the Internet for tasks sensitive to time, like video transmissions, real-time systems, and DNS lookups. 

This protocol is a David P. Reed creation (1980). An American computer scientist whose contributions helped wireless communications networks and computer networking development. UDP has become fast an important Internet protocol suite’s element.

Continue reading…