Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Author: kingsanit.pvt.ltd@gmail.com

Radio waves

Posted on by

Radio waves are waves of high wavelength and low frequency in the electromagnetic wave spectrum. The Radio wave spectrum frequency ranges from 3 KHz to 3,000 GHz. Radio Waves are governed by International Telecommunication Union (ITU). The theory of Radio Waves was brough in by Physicist and Mathematician James Clerk Maxwell in 1865. In 1880s, Physicist Heinrich Rudolf Hertz proved…

Read more

 ITU

Posted on by

ITU (International Telecommunication Union) is a special agency of United Nations that is responsible for governing matters related to Information and Communication Technologies (ICT). It was established in 1865 to support and help governing Telegraphic Networks globally. ITU has member states across the globe. Each country manages the radio spectrum within their country. The management…

Read more

Digital Electronics

Posted on by

Digital Electronics is the foundation of Computing Systems and Digital Communications which brought in the concept of Digitalization using electronic components like resistors, capacitor, logic gates, amplifiers to convert analog signals into discrete digital signals. Data was processed, stored and transmitted digitally.

Read more

Wireless

Posted on by

Wireless also known as Wireless Communication is the term referred when the communication between systems happens without any physical wires. The communication of data or voice happens in free space using Radio waves. Radio waves are electromagnetic waves with low frequency and high wavelength in the electromagnetic spectrum. Wireless is used in Wi-Fi Network, Satellite…

Read more

Electromagetic Waves

Posted on by

Electromagnetic (EM) wave also known as Electromagnetic Radiation is a self-propagating wave energy that travels at the speed of light in the form oscillating electric and magnetic fields perpendicular to each other. Electromagnetic Wave is generated when electric particles are accelerated though matter which generates electromagnetic radiation. Electromagnetic waves can travel through vacuum. Accelerating electric charge…

Read more

Energy

Posted on by

Energy is defined as the ability to do work. It is measured in Joule (J) named after PhysicistJames Prescott Joule who discovered the relationship between mechanical energy and heat energy which led to “Law Of Conversation” which states that energy cannot be created nor destroyed but can be converted from one form to another. Energy…

Read more

IAS Computer

Posted on by

The IAS Computer also known as Von Neuman Computer was the first-generation computer that was built at the Institute for Advanced Study (IAS) during 1945-1951 which implemented “stored-program concept” where the instructions and data are stored and accessed from the same electronic memory. IAS was proposed by John von Neumann who was a mathematics professor working at Princeton University…

Read more

SQL Injection (SQLi) Attack

Posted on by

SQL Injection (SQli) is an attack technique where the attacker exploits the vulnerability in Web Application of not validating inputs and injects malicious SQL statements into the Relative Databases (RDMS). Web Application is a 3-Tier Architecture. A user accesses the web server and the data from the web server is provided to the application server….

Read more

Server-Side Scripting

Posted on by

Server-Side Scripting are the programming languages that execute on the web server when processing the user’s request. They generate the dynamic content as needed by the user’s request. Server-Side Scripting languages are the fundamental components of a Web Application. Examples are PHP, Python, Ruby, JavaScript, Java. The following are various activities done by the Server-Side…

Read more

Client-Side Scripting

Posted on by

Client-Side scripting refers to the scripts that executes within the user’s web browser rather than on a web server. These scripts are downloaded from the Web Server on the local machine and gives the user the enhanced experience of running dynamic content in their local machine. Examples of client-scripting languages are JavaScript, VBScript, jQuery.

Read more
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 13
  • Next

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme