-
-
1) An algorithm can be used to attack and disable a computer by forcing it to use memory or by overworking its CPU 2) The term BYOD stands for "bring your own device" 3) An amateur hacker is called a script kiddie
-
1) Two common hash functions are MD5 and SHA 2) Authorization is the service that determines which resources a user can access along with the operations that a user can perform 3) Version Control is the mechanism that organizations use to prevent accidental changes by authorized users
-
-
-
we used a random hash generator to get random hash which we recorded my first hash was 10f12151ef41361b91ee3fc1065e14d2
-
-
-
-
-
FTP servers are the solutions used to facilitate file transfers across the internet. If you send files using FTP, files are either uploaded or downloaded to the FTP server.
-
A web server is a computer that runs websites. It's a computer program that distributes web pages as they are requisitioned
-
A mail server (or email server) is a computer system that sends and receives email.
-
The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com.
-
NTP is an internet protocol that's used to synchronise the clocks on computer networks to within a few milliseconds of universal coordinated time (UTC). It enables devices to request and receive UTC from a server that, in turn, receives precise time from an atomic clock.
-
The AAA server is a network server that is used for access control. Authentication identifies the user. Authorization implements policies that determine which resources and services an authenticated user may access. Accounting keeps track of time and data resources that are used for billing and analysis.
-