SlideShare a Scribd company logo
Info-Pro 
By : Mia Thomson
Http 
• Http stands for HyperText Transfer Protocol. It is a secure method of 
accessing or sending information across the web page.
Pop3 
• Pop3 stands for Post Office Protocol Version 3. Pop3 is an internet 
protocol used by internet service providers which permits to reteiver e-mail 
from a mail server.
Ftp 
• Ftp stands for File Transfer Protocol. It is a standard internet protocol, 
which transfers displayable web pages and related files, and the simple mail 
transfers protocol, which transfers e-mail, FTP is an application protocol that 
uses the internets TCP/IP protocols.
SMS 
• SMS stands for Short message service. It is used for delivering a short 
message over the mobile networks. (text message only)
HTTPS 
• HTTPS stands for Hypertext Transfer Protocol Secure. Https is only used 
when requiring login information or with pages that contain sensitive 
information such as an online bank web page.
SSH 
• SSH stands for Secure Shell or sometimes known as Secure Socket Shell. 
It is UNIX-based command interface and protocol for securely getting 
access to a remote computer.
NTP 
• NTP stands for Network Time Protocol. It is a networking protocol for 
clock synchronization between computer systems over packet-switched, 
variable-latency data networks.
• http://www.computerhope.com/jargon/h/http.htm 
• http://kewl.lu/articles/pop3/ 
• http://searchenterprisewan.techtarget.com/definition/File-Transfer- 
Protocol 
• http://www.wirelessdevnet.com/channels/sms/features/sms.html 
• http://searchsecurity.techtarget.com/definition/Secure-Shell

More Related Content

What's hot

TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
ByronKimani
 
Transport Layer Security
Transport Layer Security Transport Layer Security
Transport Layer Security
Ibrahiem Mohammed
 
Protocol
ProtocolProtocol
Transport layer security
Transport layer securityTransport layer security
Transport layer security
Hrudya Balachandran
 
Sfd2013 unified communicationsystem-netnam-0.3
Sfd2013 unified communicationsystem-netnam-0.3Sfd2013 unified communicationsystem-netnam-0.3
Sfd2013 unified communicationsystem-netnam-0.3
nguyen long
 
Http - All you need to know
Http - All you need to knowHttp - All you need to know
Http - All you need to know
Gökhan Şengün
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
Kalpesh Kalekar
 
Http tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew webHttp tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew webDaniel Adenew
 
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal Wadhwa
Mrinal Wadhwa
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
Asad Ali
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
Huda Seyam
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
Ram Dutt Shukla
 
DANE and DNSSEC Authentication Chain Extension for TLS
DANE and DNSSEC Authentication Chain Extension for TLSDANE and DNSSEC Authentication Chain Extension for TLS
DANE and DNSSEC Authentication Chain Extension for TLS
Shumon Huque
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer SecurityChhatra Thapa
 
Secure Sockets Layer and Transport Layer Security
Secure Sockets Layer and Transport Layer SecuritySecure Sockets Layer and Transport Layer Security
Secure Sockets Layer and Transport Layer Security
Al Mamun
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
Arpit Agarwal
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
sravya raju
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer security
Maarten Smeets
 

What's hot (20)

TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
Transport Layer Security
Transport Layer Security Transport Layer Security
Transport Layer Security
 
Protocol
ProtocolProtocol
Protocol
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Sfd2013 unified communicationsystem-netnam-0.3
Sfd2013 unified communicationsystem-netnam-0.3Sfd2013 unified communicationsystem-netnam-0.3
Sfd2013 unified communicationsystem-netnam-0.3
 
Http - All you need to know
Http - All you need to knowHttp - All you need to know
Http - All you need to know
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Http tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew webHttp tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew web
 
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal Wadhwa
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
DANE and DNSSEC Authentication Chain Extension for TLS
DANE and DNSSEC Authentication Chain Extension for TLSDANE and DNSSEC Authentication Chain Extension for TLS
DANE and DNSSEC Authentication Chain Extension for TLS
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Secure Sockets Layer and Transport Layer Security
Secure Sockets Layer and Transport Layer SecuritySecure Sockets Layer and Transport Layer Security
Secure Sockets Layer and Transport Layer Security
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer security
 

Viewers also liked

HTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User GroupHTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User Group
Jason Stangroome
 
Https
HttpsHttps
It Services Secure Email Presentation
It Services Secure Email PresentationIt Services Secure Email Presentation
It Services Secure Email Presentationbryanpsu
 
Https
HttpsHttps
Secure Email Overview - NeoCertified Demo
Secure Email Overview - NeoCertified DemoSecure Email Overview - NeoCertified Demo
Secure Email Overview - NeoCertified Demo
Brent Faulk
 
HTTP Definition and Basics.
HTTP Definition and Basics.HTTP Definition and Basics.
HTTP Definition and Basics.Halah Salih
 
Https
HttpsHttps
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...rahul kundu
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Pina Parmar
 
Why is email security important?
Why is email security important?Why is email security important?
Why is email security important?NeoCertified
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
Salman Memon
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
amanchaurasia
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
Sandeep Gupta
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 

Viewers also liked (20)

HTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User GroupHTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User Group
 
Https
HttpsHttps
Https
 
It Services Secure Email Presentation
It Services Secure Email PresentationIt Services Secure Email Presentation
It Services Secure Email Presentation
 
Https
HttpsHttps
Https
 
Secure Email Overview - NeoCertified Demo
Secure Email Overview - NeoCertified DemoSecure Email Overview - NeoCertified Demo
Secure Email Overview - NeoCertified Demo
 
HTTP Definition and Basics.
HTTP Definition and Basics.HTTP Definition and Basics.
HTTP Definition and Basics.
 
Https
HttpsHttps
Https
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Why is email security important?
Why is email security important?Why is email security important?
Why is email security important?
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 

Similar to 7 Protocols

Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
Himanshu Pathak
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
ShofiqulIslam38
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
NaveenreddyMeegada
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocolsPriyanka Shinde
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-
markgernale24
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
Kak Yong
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
ArnavPlayz
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
nitashach22
 
PROTOCOLS AND ITS TYPES.docx
PROTOCOLS AND ITS TYPES.docxPROTOCOLS AND ITS TYPES.docx
PROTOCOLS AND ITS TYPES.docx
amazingthings2743
 
Url and protocol
Url and protocolUrl and protocol
Url and protocol
Waheed Iqbal Boss
 
protocols (1).pptx
protocols (1).pptxprotocols (1).pptx
protocols (1).pptx
ALLIPURAMLAVANYA21K9
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and serviceslearnt
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
Šhæÿæñ Æhmęd
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
Application Layer
Application LayerApplication Layer
Application Layer
Sweta Kumari Barnwal
 
Vishal patel.pptx
Vishal patel.pptxVishal patel.pptx
Vishal patel.pptx
Vishalkumar605125
 
Network protocols
Network protocolsNetwork protocols
Network protocols
Dr. B T Sampath Kumar
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
Ramesh S P Ramesh
 
Fit project
Fit projectFit project
Fit project
ajay raghavender
 

Similar to 7 Protocols (20)

Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
PROTOCOLS AND ITS TYPES.docx
PROTOCOLS AND ITS TYPES.docxPROTOCOLS AND ITS TYPES.docx
PROTOCOLS AND ITS TYPES.docx
 
Url and protocol
Url and protocolUrl and protocol
Url and protocol
 
protocols (1).pptx
protocols (1).pptxprotocols (1).pptx
protocols (1).pptx
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and services
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Protocols
ProtocolsProtocols
Protocols
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Vishal patel.pptx
Vishal patel.pptxVishal patel.pptx
Vishal patel.pptx
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
 
Fit project
Fit projectFit project
Fit project
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

7 Protocols

  • 1. Info-Pro By : Mia Thomson
  • 2. Http • Http stands for HyperText Transfer Protocol. It is a secure method of accessing or sending information across the web page.
  • 3. Pop3 • Pop3 stands for Post Office Protocol Version 3. Pop3 is an internet protocol used by internet service providers which permits to reteiver e-mail from a mail server.
  • 4. Ftp • Ftp stands for File Transfer Protocol. It is a standard internet protocol, which transfers displayable web pages and related files, and the simple mail transfers protocol, which transfers e-mail, FTP is an application protocol that uses the internets TCP/IP protocols.
  • 5. SMS • SMS stands for Short message service. It is used for delivering a short message over the mobile networks. (text message only)
  • 6. HTTPS • HTTPS stands for Hypertext Transfer Protocol Secure. Https is only used when requiring login information or with pages that contain sensitive information such as an online bank web page.
  • 7. SSH • SSH stands for Secure Shell or sometimes known as Secure Socket Shell. It is UNIX-based command interface and protocol for securely getting access to a remote computer.
  • 8. NTP • NTP stands for Network Time Protocol. It is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.
  • 9. • http://www.computerhope.com/jargon/h/http.htm • http://kewl.lu/articles/pop3/ • http://searchenterprisewan.techtarget.com/definition/File-Transfer- Protocol • http://www.wirelessdevnet.com/channels/sms/features/sms.html • http://searchsecurity.techtarget.com/definition/Secure-Shell