Random Access Memory(RAM)

Random Access Memory(RAM)

Stack and Queue

Stack and Queue

How your browser secure your communications over the Internet?

How your browser secure your communications over the Internet?

A Brief History of the WEB

A Brief History of the WEB

A brief history of Computer Storage Media

A brief history of Computer Storage Media

ARP poisoning and Port mirroring attacks

ARP poisoning and Port mirroring attacks

Switch attacks: MAC Flooding and MAC Spoofing

Switch attacks: MAC Flooding and MAC Spoofing

Network Devices to Protect your Intranet

Network Devices to Protect your Intranet

Malware 2: Rootkit, keylogger, logic bomb, adware, & botnet

Malware 2: Rootkit, keylogger, logic bomb, adware, & botnet

Malware: virus, worm, Trojan horse, spyware, & ransomware

Malware: virus, worm, Trojan horse, spyware, & ransomware

How does cellular network work?

How does cellular network work?

How does SNMP work?

How does SNMP work?

General switch vs managed switch

General switch vs managed switch

Summary of six dynamic routing protocols

Summary of six dynamic routing protocols

Distance-vector vs link-state and a hybrid EIGRP

Distance-vector vs link-state and a hybrid EIGRP

Link state routing protocols: IS to IS and OSPF

Link state routing protocols: IS to IS and OSPF

Distance vector routing protocols: RIP and IGRP

Distance vector routing protocols: RIP and IGRP

static vs dynamic routing & routing metrics

static vs dynamic routing & routing metrics

Five factors of Authentication

Five factors of Authentication

AS : Interior and border routers, Border Gateway Protocol

AS : Interior and border routers, Border Gateway Protocol

ChatGPT: A mind-blowing AI

ChatGPT: A mind-blowing AI

All about Bluetooth

All about Bluetooth

How does a SOHO router works

How does a SOHO router works

Routers, functions, interfaces and ports

Routers, functions, interfaces and ports

13 types of computer networks

13 types of computer networks

SMS phishing attacks and how to prevent them

SMS phishing attacks and how to prevent them

Data Storage Types: File, Block, & Object

Data Storage Types: File, Block, & Object

The ElGamal Algorithm: a simple example

The ElGamal Algorithm: a simple example

Intro to the ElGamal Cryptosystem

Intro to the ElGamal Cryptosystem

How to test if g is a primitive root of a prime number p?

How to test if g is a primitive root of a prime number p?