Data communication and networks by B. ForouzanPreethi T G
This document discusses different types of computer network topologies and categories. It describes mesh, star, bus, and ring topologies, providing their key characteristics, advantages, and disadvantages. It also defines local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs), and discusses how multiple networks can be interconnected through an internet. The document serves to provide an overview of fundamental network topology and category concepts.
Hacking and protecting yourself from hackers .Preethi T G
In this ppt , We will discuss about the consequences of intrusion ,indirect threads and A word on hacking and hackers . 10 sure signs you have been hacked , 10 ways to protect yourself from hackers .
This topic is about list of National symbols in India . I am explain about National Flag , National Emblem , National Motto , National Calendar and National Aquatic Animal .
The document discusses different types of files used in operating systems, including their common file extensions and attributes. It provides examples of 15 different file types: text files, plain text files, audio files, MIDI files, data files, video files, image files, GIF files, spreadsheet files, database files, SQL database files, game files, HTML files, PHP files, and PDF files. For each file type, it lists attributes like the file name, extension, size, location, date, and sometimes password.
This topic is about various cultures in Tamil Nadu . I am explain about temples , festival , entertainment , art , architecture and food in Tamil Nadu .I am very proud as a Tamil girl in our Tamil Nadu
Normalization in relational database management systemsPreethi T G
The document discusses database normalization. Normalization is the process of organizing data to avoid data redundancy and inconsistencies. It involves splitting tables and rejoining them through relationships. There are several normal forms that data can be organized into from 1st normal form to 5th normal form, each addressing different types of dependencies and relationships to minimize data anomalies. The goal of normalization is to organize data to reduce storage, improve flexibility, and avoid data problems like duplication, insertion, deletion, and update anomalies.
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...Preethi T G
This topic is about Software Quality Management in Wipro company and case tools . This is very interesting topic about Wipro company in Software Engineering course .
Data communication and networks by B. ForouzanPreethi T G
This document discusses different types of computer network topologies and categories. It describes mesh, star, bus, and ring topologies, providing their key characteristics, advantages, and disadvantages. It also defines local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs), and discusses how multiple networks can be interconnected through an internet. The document serves to provide an overview of fundamental network topology and category concepts.
Hacking and protecting yourself from hackers .Preethi T G
In this ppt , We will discuss about the consequences of intrusion ,indirect threads and A word on hacking and hackers . 10 sure signs you have been hacked , 10 ways to protect yourself from hackers .
This topic is about list of National symbols in India . I am explain about National Flag , National Emblem , National Motto , National Calendar and National Aquatic Animal .
The document discusses different types of files used in operating systems, including their common file extensions and attributes. It provides examples of 15 different file types: text files, plain text files, audio files, MIDI files, data files, video files, image files, GIF files, spreadsheet files, database files, SQL database files, game files, HTML files, PHP files, and PDF files. For each file type, it lists attributes like the file name, extension, size, location, date, and sometimes password.
This topic is about various cultures in Tamil Nadu . I am explain about temples , festival , entertainment , art , architecture and food in Tamil Nadu .I am very proud as a Tamil girl in our Tamil Nadu
Normalization in relational database management systemsPreethi T G
The document discusses database normalization. Normalization is the process of organizing data to avoid data redundancy and inconsistencies. It involves splitting tables and rejoining them through relationships. There are several normal forms that data can be organized into from 1st normal form to 5th normal form, each addressing different types of dependencies and relationships to minimize data anomalies. The goal of normalization is to organize data to reduce storage, improve flexibility, and avoid data problems like duplication, insertion, deletion, and update anomalies.
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...Preethi T G
This topic is about Software Quality Management in Wipro company and case tools . This is very interesting topic about Wipro company in Software Engineering course .
binary tree representation and traversal Preethi T G
This topic is about binary tree representation and traversal in data structures and algorithms. It is very understandable and interesting topic in data structures.
Software engineering project(Bikes and scooters rental system)Preethi T G
This topic is about software engineering project. I was applied software development lifecycles(SDLC) in bikes and scooters rental system. keep learning. Thank you.
Principles of programming languages(Functional programming Languages using LISP)Preethi T G
This topic is about LISP Language in Functional Programming.IT was interesting topic. Here I was posted the topics were history of lisp language, Lisp features , example program, Advantages,disadvantages and applications of lisp language. Thank you. keep learning.
Relational Database Management System(TCS)Preethi T G
This topic is about IT sector. I was selected TCS company which is named as Tata Consultancy Services. I was created the company's database system and I was included Entity Relationship Diagram which is named as ER Diagram.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
binary tree representation and traversal Preethi T G
This topic is about binary tree representation and traversal in data structures and algorithms. It is very understandable and interesting topic in data structures.
Software engineering project(Bikes and scooters rental system)Preethi T G
This topic is about software engineering project. I was applied software development lifecycles(SDLC) in bikes and scooters rental system. keep learning. Thank you.
Principles of programming languages(Functional programming Languages using LISP)Preethi T G
This topic is about LISP Language in Functional Programming.IT was interesting topic. Here I was posted the topics were history of lisp language, Lisp features , example program, Advantages,disadvantages and applications of lisp language. Thank you. keep learning.
Relational Database Management System(TCS)Preethi T G
This topic is about IT sector. I was selected TCS company which is named as Tata Consultancy Services. I was created the company's database system and I was included Entity Relationship Diagram which is named as ER Diagram.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.