-
PC Assembly - Hard drive installation
Hard drives, CD-ROM, DVD-ROM drives and floppy drive The motherboard usually has two IDE (Integrated Device Electronics) connectors: The first connector is known as the primary device controller; The second is known as the secondary... Read more
Computer: assemblyOctober 16, 2008 at 09:43 AM -
PC assembly - Inserting expansion cards
Inserting expansion cards Expansion cards are plugged into expansion slots. There are several types of slots: ISA slots run at 16 bits. Few computers still use this type of slot as the bus runs at a relatively slow speed. PCI slots run... Read more
Computer: assemblyOctober 16, 2008 at 09:43 AM -
PC Assembly - Installing the processor
The processor The processor is the computer's key integrated circuit which performs the main calculations. Processors come in various formats which can be grouped into two families: Socket processors Slot processors ZIF socket When... Read more
Computer: assemblyOctober 16, 2008 at 09:43 AM -
How To Assemble a PC
A PC is a modular type of computer that can be assembled using hardware components made by different manufacturers. This allows you to have a custom-built computer that matches your specific needs. This article will explain to you the... Read more
Computer: assemblyJanuary 26, 2021 at 10:45 AM -
PC Assembly - Getting the case ready
Getting the casing ready When preparing to build a PC make sure to have the following: a phillips screwdriver, the necessary screws and the various cables and connectors. There are some simple guidelines that should be followed: Never... Read more
Computer: assemblyOctober 16, 2008 at 09:43 AM -
Man in the middle attack
ARP attack One of the most famous man in the middle attacks involves exploiting a weakness in the ARP (Address Resolution Protocol), the goal of which is to help find the IP address of a machine by knowing the physical address (MAC... Read more
AttacksOctober 16, 2008 at 09:43 AM -
SYN attack
SYN attack The "SYN attack" (also called "TCP/SYN Flooding") is a network saturation (denial-of-service) attack that exploits the Three-way handshake mechanism of the TCP protocol. The three-way handshake is the way in which any... Read more
AttacksOctober 16, 2008 at 09:43 AM -
Buffer overflow attacks
Buffer overflow introduction "Buffer overflow" (sometimes called buffer overrun) attacks are designed to trigger arbitrary code execution by a program by sending it more data than it is supposed to receive. Programs that accept... Read more
AttacksOctober 16, 2008 at 09:43 AM -
Denial of Service Attack
What is ”denial of service attack” (DoS)? It is a type of attack that aims to make an organization's services or resources unavailable for an indefinite amount of time. Denial-of-service attacks are a hassle that can affect any company... Read more
AttacksJanuary 26, 2021 at 10:54 AM -
Man in the middle attack
Man in the middle attack The "man in the middle" attack, sometimes abbreviated MITM, is an attack scenario where an attacker monitors a communication between two parties and falsifies the exchanges to impersonate one of the parties.... Read more
AttacksOctober 16, 2008 at 09:43 AM -
URL Manipulation Attacks
The URL (Uniform Resource Locator) of a web application is the vector that makes it possible to indicate the requested resource. This article will show you how to protect yourself against URL manipulation attacks. The Essence of a URL... Read more
AttacksJanuary 26, 2021 at 10:39 AM -
Security - Network intrusion methodology
The goal of this article is to explain the methodology that pirates generally use to infiltrate a computer system. Its purpose is not to explain how to compromise a system but to help you understand how the process works so you can... Read more
AttacksOctober 16, 2008 at 09:43 AM -
Replay Attack
What is a replay attack? A replay attack is a network, a ”Man-in-the-middle" attack that involves intercepting data packets and replaying them. This means resending them as is (with no decryption) to the receiving server. Another common... Read more
AttacksJanuary 22, 2021 at 11:18 AM -
Network analyzers (sniffers)
Network analysis A "network analyzer" (also called a sniffer), is a device that makes it possible to "monitor" a network's traffic, that is, to capture information circulating on that network. On an unswitched network, data are sent to... Read more
AttacksOctober 16, 2008 at 09:43 AM -
Assessment security and types of hackers
What is a hacker? The term "hacker" is often used to refer to a computer pirate. Victims of piracy on computer networks like to think they have been attacked by experienced pirates who have carefully studied their system and developed... Read more
AttacksOctober 16, 2008 at 09:43 AM -
Dolby Digital (AC3)
Launched in 1987, the Dolby Digital format is a digital audio encoding standard developed by Dolby Labs. Unlike Dolby ProLogic systems, Dolby Digital audio tracks are independent (the term "discrete" is also sometimes used). Format... Read more
AudioJanuary 15, 2021 at 04:49 AM