Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Diskless Workstation

Posted on by

A diskless workstation is a workstation without disk drives that leverages network booting to load its operating system from a central server. It has a minimal memory for basic functions of a computing node. Diskless workstation has lower production and operational cost with less overhead.

Read more

CAM (Content Addressable Memory) Table

Posted on by

The switch has a CAM (Content Addressable Memory) table which has mapping of the ports and MAC addresses of the computing node that is connected to each port. The switch learns the MAC address of the nodes initially when it is sending data on the port. The first frame from each node is always broadcasted…

Read more

MAC (Medium Access Control) Address

Posted on by

MAC (Medium Access Control) Address is unique identifier hardware address assigned to Network Interface Card (NIC) of any computing node. All computing nodes need a layer 2 hardware address for transmitting data which happens at Data Link Layer (Layer 2) and Physical Layer (Layer 1) of the OSI layer. When transmitting data on the LAN,…

Read more

IEEE 802

Posted on by

IEEE 802 is a networking standard developed and maintained by LAN/MAN Standards Committee (LMSC) for Local Area Network (LAN), Personal Area Network (PAN) and Metropolitan Area Network (MAN). IEEE 802 recommends best practices using an open and accredited process for Wired LAN, Wireless LAN, Wireless PAN, Wireless MAN.

Read more

Sniffing

Posted on by

Sniffing is the act of monitoring and capturing the network traffic. An attacker sniffs the network traffic by inserting a software or hardware into the network between the sender and receiver. Sniffing is also referred as Network Sniffing which is a type of Eavesdropping. Types of Sniffing Passive Sniffing is where the attacker passively listens…

Read more

Eavesdropping

Posted on by

Eavesdropping is the act of intercepting the conversation between two systems. A hacker intercepts the session between two machines. After interception, the attacker can gain access to data or modify the data or delete the data. The interception can be simple as like over hearing two people talking or sophisticated like intercepting an application session…

Read more

Promiscuous Mode

Posted on by

A Computer Network is collection of computing nodes connected through a switch or hub. Data is sent from a system (sender) to another system (receiver). At the layer 2 of the OSI layer, packet is converted into a frame which has the Source Hardware Address and Destination Hardware Address. In Ethernet based LAN, MAC address…

Read more

Switch

Posted on by

A switch is a network device that connects multiple computing nodes to form a LAN and does switching of data at the data link (layer 2) of the OSI Layers. The switch uses star network topology where it becomes the central component of the network of the connected computer nodes. The data transmitted from the…

Read more

Broadcast Domain

Posted on by

Broadcast Domain is the domain of a Network in which broadcasts can be sent by a node and received by all other nodes connected in that network domain. The broadcast is done at the Data Link Layer (Layer 2) of the OSI Layers. Special Layer 2 address is allocated for broadcast known as broadcast address….

Read more

Network Topology

Posted on by

Network Topology is the physical and logical arrangement of the nodes and links in a Computer Network. Nodes are the compute devices that connect to the network and links are the medium that connect the nodes. The network topology depicts that structure of the network along with the nodes and links. Network Topology application of…

Read more
  • Previous
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • …
  • 13
  • Next

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme