Search
All categories
Results 1 - 20 of about 357
  • PC Assembly - Hard drive installation

    Hard drives, CD-ROM, DVD-ROM drives and floppy drive The motherboard usually has two IDE (Integrated Device Electronics) connectors: The first connector is known as the primary device controller; The second is known as the secondary... Read more

    Computer: assembly
    October 16, 2008 at 09:43 AM
  • PC assembly - Inserting expansion cards

    Inserting expansion cards Expansion cards are plugged into expansion slots. There are several types of slots: ISA slots run at 16 bits. Few computers still use this type of slot as the bus runs at a relatively slow speed. PCI slots run... Read more

    Computer: assembly
    October 16, 2008 at 09:43 AM
  • PC Assembly - Installing the processor

    The processor The processor is the computer's key integrated circuit which performs the main calculations. Processors come in various formats which can be grouped into two families: Socket processors Slot processors ZIF socket When... Read more

    Computer: assembly
    October 16, 2008 at 09:43 AM
  • PC Assembly

    A PC is a modular type of computer that can be assembled using hardware components made by different manufacturers. This allows you to have a custom-built computer that matches your specific needs. This article will explain to you the... Read more

    Computer: assembly
    June 22, 2018 at 01:52 AM
  • PC Assembly - Getting the case ready

    Getting the casing ready When preparing to build a PC make sure to have the following: a phillips screwdriver, the necessary screws and the various cables and connectors. There are some simple guidelines that should be followed: Never... Read more

    Computer: assembly
    October 16, 2008 at 09:43 AM
  • Man in the middle attack

    ARP attack One of the most famous man in the middle attacks involves exploiting a weakness in the ARP (Address Resolution Protocol), the goal of which is to help find the IP address of a machine by knowing the physical address (MAC... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • SYN attack

    SYN attack The "SYN attack" (also called "TCP/SYN Flooding") is a network saturation (denial-of-service) attack that exploits the Three-way handshake mechanism of the TCP protocol. The three-way handshake is the way in which any... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Buffer overflow attacks

    Buffer overflow introduction "Buffer overflow" (sometimes called buffer overrun) attacks are designed to trigger arbitrary code execution by a program by sending it more data than it is supposed to receive. Programs that accept... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Denial of service attack

    Introduction to denial-of-service attacks A "denial-of-service attack" (abbreviated DoS) is a type of attack that aims to make an organization's services or resources unavailable for an indefinite amount of time. Most of the time, these... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Exploits

    Exploits An "exploit" is a computer program that "exploits" a vulnerability, whether or not it is published. Each exploit is specific to a version of an application as it exploits flaws in that version. There are various types of... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Man in the middle attack

    Man in the middle attack The "man in the middle" attack, sometimes abbreviated MITM, is an attack scenario where an attacker monitors a communication between two parties and falsifies the exchanges to impersonate one of the parties.... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • URL Manipulation Attacks

    The URL (Uniform Resource Locator) of a web application is the vector that makes it possible to indicate the requested resource. This article will show you how to protect yourself against URL manipulation attacks. The Makeup of a URL... Read more

    Attacks
    June 19, 2018 at 06:25 PM
  • Security - Network intrusion methodology

    The goal of this article is to explain the methodology that pirates generally use to infiltrate a computer system. Its purpose is not to explain how to compromise a system but to help you understand how the process works so you can... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Passwords

    Passwords Attack methods Brute force cracking Dictionary attack Hybrid attack Choosing a password Password policies Multiple passwords Passwords When connecting to a computer system, you usually have to enter a log in or username and a... Read more

    Attacks
    November 12, 2012 at 12:41 PM
  • Replay attack

    Replay attack "Replay" attacks are "Man in the middle" attacks that involve intercepting data packets and replaying them, that is, resending them as is (with no decryption) to the receiving server. As a result, depending on the context,... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • E-mail scams - Fund transfer scams

    Scams A "scam" is a fraudulent practice of African origin that involves extorting funds from internet users by enticing them with a sum of money and promising them a share of it. The use of scams originated in Nigeria, which has also... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Network analyzers (sniffers)

    Network analysis A "network analyzer" (also called a sniffer), is a device that makes it possible to "monitor" a network's traffic, that is, to capture information circulating on that network. On an unswitched network, data are sent to... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Assessment security and types of hackers

    What is a hacker? The term "hacker" is often used to refer to a computer pirate. Victims of piracy on computer networks like to think they have been attacked by experienced pirates who have carefully studied their system and developed... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • AAC (m4a)

    Introduction to AAC format AAC (Audio Advanced Coding) is an audio data compression format developed by the Fraunhofer Institute in cooperation with AT, Nokia, Sony and Dolby. As with the MP3 format, it's a form of compression which... Read more

    Audio
    October 16, 2008 at 09:43 AM
  • Dolby Digital (AC3)

    Launched in 1987, the Dolby Digital format is a digital audio encoding standard developed by Dolby Labs. Unlike Dolby ProLogic systems, Dolby Digital audio tracks are independent (the term "discrete" is also sometimes used). Format... Read more

    Audio
    January 15, 2021 at 04:49 AM

Subscribe To Our Newsletter!

The Best of CCM in Your Inbox

Subscribe To Our Newsletter!