Hard drives, CD-ROM, DVD-ROM drives and floppy drive The motherboard usually has two IDE (Integrated Device Electronics) connectors: The first connector is known as the primary device controller; The second is known as the secondary... Read more
Inserting expansion cards Expansion cards are plugged into expansion slots. There are several types of slots: ISA slots run at 16 bits. Few computers still use this type of slot as the bus runs at a relatively slow speed. PCI slots run... Read more
The processor The processor is the computer's key integrated circuit which performs the main calculations. Processors come in various formats which can be grouped into two families: Socket processors Slot processors ZIF socket When... Read more
A PC is a modular type of computer that can be assembled using hardware components made by different manufacturers. This allows you to have a custom-built computer that matches your specific needs. This article will explain to you the... Read more
Getting the casing ready When preparing to build a PC make sure to have the following: a phillips screwdriver, the necessary screws and the various cables and connectors. There are some simple guidelines that should be followed: Never... Read more
ARP attack One of the most famous man in the middle attacks involves exploiting a weakness in the ARP (Address Resolution Protocol), the goal of which is to help find the IP address of a machine by knowing the physical address (MAC... Read more
SYN attack The "SYN attack" (also called "TCP/SYN Flooding") is a network saturation (denial-of-service) attack that exploits the Three-way handshake mechanism of the TCP protocol. The three-way handshake is the way in which any... Read more
Buffer overflow introduction "Buffer overflow" (sometimes called buffer overrun) attacks are designed to trigger arbitrary code execution by a program by sending it more data than it is supposed to receive. Programs that accept... Read more
Introduction to denial-of-service attacks A "denial-of-service attack" (abbreviated DoS) is a type of attack that aims to make an organization's services or resources unavailable for an indefinite amount of time. Most of the time, these... Read more
Man in the middle attack The "man in the middle" attack, sometimes abbreviated MITM, is an attack scenario where an attacker monitors a communication between two parties and falsifies the exchanges to impersonate one of the parties.... Read more
The URL (Uniform Resource Locator) of a web application is the vector that makes it possible to indicate the requested resource. This article will show you how to protect yourself against URL manipulation attacks. The Makeup of a URL... Read more
The goal of this article is to explain the methodology that pirates generally use to infiltrate a computer system. Its purpose is not to explain how to compromise a system but to help you understand how the process works so you can... Read more
Replay attack "Replay" attacks are "Man in the middle" attacks that involve intercepting data packets and replaying them, that is, resending them as is (with no decryption) to the receiving server. As a result, depending on the context,... Read more
Scams A "scam" is a fraudulent practice of African origin that involves extorting funds from internet users by enticing them with a sum of money and promising them a share of it. The use of scams originated in Nigeria, which has also... Read more
Network analysis A "network analyzer" (also called a sniffer), is a device that makes it possible to "monitor" a network's traffic, that is, to capture information circulating on that network. On an unswitched network, data are sent to... Read more
What is a hacker? The term "hacker" is often used to refer to a computer pirate. Victims of piracy on computer networks like to think they have been attacked by experienced pirates who have carefully studied their system and developed... Read more
Launched in 1987, the Dolby Digital format is a digital audio encoding standard developed by Dolby Labs. Unlike Dolby ProLogic systems, Dolby Digital audio tracks are independent (the term "discrete" is also sometimes used). Format... Read more