Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Author: kingsanit.pvt.ltd@gmail.com

Social Engineering

Posted on by

Social Engineering is the act of manipulating people and getting confidential information which is not accessible in normal circumstances. It is technique used as part of Active Footprinting where an attacker tries to gather information about a target initially before further moving in other phases of Cyber Kill Chain of an attack. Social Engineering relies…

Read more

Phishing

Posted on by

Phishing is an act where an attacker impersonates as a legitimate person or entity and deceives a target to get sensitive information by sending emails, texts, SMS or having voice calls. The following are different techniques used in phishing attack.

Read more

Cycles Per Instruction (CPI)

Posted on by

Cycles Per Instruction (CPI) as known as Clock Cycle Per Instructions or Clocks Per Instruction is the number of clock cycles per cycle. It’s a critical metric with which a computer’s performance is measured and assessed. CPI Formula CPI = Total CPU Cycles / Total Instructions 

Read more

Domain Name Service (DNS)

Posted on by

Domain Name Service (DNS) provides naming service for computers and services. It has a database of mappings of hostnames to IP addresses. Client which wants to access target services on a server, connects to the hostnames. To resolve the hostname, the client send requests to the DNS server and gets the IP address. Using the…

Read more

Computer Organization

Posted on by

Computer Organization is the collection of hardware units and their interconnection. It refers to how different operational components like processor, memory and peripheral devices are connected and their roles played when executing an instruction given to the computer.

Read more

Computer Architecture

Posted on by

Computer Architecture is the structure and behavior of a Computer that is visible to a programmer. A programmer uses the computer to execute a set of instructions for a specific objective. Computer Architecture is used interchangeably with Instruction Set. The Instruction Set is which that outlines the Computer Architecture.

Read more

Defense Advanced Research Projects Agency (DARPA)

Posted on by

Defense Advanced Research Projects Agency (DARPA) is a research and development agency in United States governed by Department of Defense (DOD) that is responsible for the development of emerging and breakthrough technologies for US military. ARPA was established in 1957. DARPA programs focus on the fundamental research required to establish proof of concept. 

Read more

Network Information Center (NIC)

Posted on by

Network Information Center (NIC) also known as InterNIC was the organization that was responsible for Domain Name System (DNS) domain name allocations and X.500 directory services. From 1998, the Internet Corporation for Assigned Names and Numbers (ICANN) took it the responsibility for managing DNS.

Read more

Dynamic Host Control Protocol (DHCP)

Posted on by

Dynamic Host Control Protocol (DHCP) is a network management protocol that is used in IP network to assign IP addressed to nodes connected to the network automatically. DHCP is described in RFC 2131. In 1980s, there was Diskless Workstations which did not have disk with basic memory that used network booting. Since it has very…

Read more

Bootstrap Protocol (BOOTP)

Posted on by

Bootstrap Protocol (BOOTP) is Networking Protocol that is used to assign dynamic IP address to workstations. BOOTP replaced RARP which has limitations of sending additional network configuration data apart from IP address and couldn’t operate across subnets as it’s OSI Layer 2 based protocol. BOOTP operates at L4 of OSI Layer and uses UDP to…

Read more
  • Previous
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 13
  • Next

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme