The Cyber Cops

Tagtechnology

How Email Works

H

As mentioned in a previous article, email is the electronic way of exchanging (digital) mail through the use of internet and it is the electronic equivalent of the regular mail that we send through a post-office. When you send an email, you send it to a user’s mailbox on a server. But to get clarity on how it actually works, we need to understand certain concepts. Mail Transfer Agent (MTA)...

Proxy Server & Proxy Website

P

Proxy Server Normally when you want to access some website over the Internet, you do so via your web browser. But in certain networks, to provide security and privacy, there exist some servers which act as intermediaries between a device in a network and the Internet. Here, when a device wants to open a website, it will place the request to the such intermediary servers (called Proxy Servers)...

Network Types – LAN/WAN/MAN/PAN

N

Local Area Network (LAN) – LAN is usually present in a local area, usually an office or home. LAN is very small in size and generally very fast since all devices are almost right next to each other. A LAN is generally of two types – based on Ethernet (i.e. wired) and based on WiFi (i.e. wireless). This is the most common way to connect computers in schools, colleges and other...

Radio Frequency identification (RFID)

R

Radio Frequency identification (RFID) is a technology where a certain chip with electromagnetic field is used to identify tags attached to identity cards, products and even mobile devices. These tags include a radio receiver and transmitter. Most of the tags don’t have a dedicated power source as they use the power of the reader to activate their internal radio modules. These type of tags are...

Network addressing

N

Network Addressing consists of various terminologies which are explained below. To learn how Internet works, click here. MAC Address In network addressing, is the physical address of a communication device. It is assigned to the device by the manufacturer and is also called as the “hardware address” or the “burned in” address of the device. This address usually cannot be...

P2P Networks

P

In traditional networks, there is a computer server which receives requests from various computers, processes those requests and sends data back to the computer. Generally, for every server, there are a lot more computers who are sending requests to the server. Thus, the server is the main device which is spending its resources. On the other hand, in a peer-to-peer (P2P) network, all the...

Virtual Reality

V

Virtual Reality (VR) refers to a computer generated environment which can be explored and interacted with by a person. Thus, it is a simulated environment, which may or may not be similar to something which exists in reality. VR usually uses some kind of feedback mechanism wherein some inputs from the user, e.g. user’s movement or actions are tracked so that the virtual environment can be...

USB – Universal Serial Bus

U

A Universal Serial Bus (USB) is a type of connection present in a computer or other electronic devices. The first Universal Serial Bus standard came up in 1996 and the latest specification version 4 came in 2019. It establishes specifications for cables and connectors and protocols for connection, communication and power supply between computers, peripheral devices and other computers. Before...

3D Printing

3

Normal printers print content onto a sheet of paper, which is a 2-Dimensional object. As the name suggets, 3D printing involves printing a three dimensional object, i.e. an object that has height, width and depth. The process of printing a 3D object is same as that for printing a 2D object: The user gives print command to the software being used by him.The software sends print data to the printer...

Cracked Software

C

A software generally falls into one of the following categories: Open Source Software (freely available + source code is available free of cost)Freeware (freely available)Shareware (some or all features of the software are available for a limited period of time or all features are available for a limited period of time and then the software is locked till it is purchased by making a...

The Cyber Cops