Wednesday, June 14, 2017

Virtual Private Network (VPN)

A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less secure network, such as the internet. VPN technology was developed as a way to allow remote users and branch offices to securely access corporate applications and other resources. To ensure safety, data travels through secure tunnels and VPN users must use authentication methods -- including passwords, tokens and other unique identification methods -- to gain access to the VPN.

Types of VPN protocols:

1. Internet Protocol Security or IPSec:
2. Layer 2 Tunneling Protocol (L2TP):
3. Point – to – Point Tunneling Protocol (PPTP):
4. Secure Sockets Layer (SSL) and Transport Layer Security (TLS):
5. OpenVPN:
6. Secure Shell (SSH):

VPN Software:


These are the good VPN also mobile devices ! We can use. I use TunnelBear, 1.5 GB per month you can get!

Straight Cable

1 - Connect a computer to a switch/hub's normal port. 
2 - Connect a computer to a cable/DSL modem's LAN port.
3 - Connect a router's WAN port to a cable/DSL modem's LAN port. 
4 - Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding network).
5 - Connect 2 switches/hubs with one of the switch/hub using an uplink port and the other one using normal port.




Crossover Cable  

1 - Connect 2 computers directly.
2 - Connect a router's LAN port to a switch/hub's normal port. (normally used for expanding network)
3 - Connect 2 switches/hubs by using normal port in both switches/hubs.





Tuesday, May 16, 2017


The attacks, which see a virus encrypt a computers files and demand payment in bitcoin to de-code them.

It affects to only computers powered by Microsoft Windows. It will not affect Mac, iPhone or Android. If you're running a Windows-powered PC, make sure all your software is up to date

How can we avoid this problem?
1.       Do not open suspicious emails
2.       Do not open on links you don't know
3.       Don't en any files you weren't expecting
4.       Make sure software is up to date

Friday, May 12, 2017

தமிழ் தட்டச்சு - பொனடிக் யுனிக்கோட்


NHM Writer Link | Direct Download

தமிழ் தட்டச்சு - பாமினி


Direct Download












1.       Bitdefender Antivirus Free Edition
2.       Avira Antivirus
3.       Avast Free Antivirus
4.       AVG Free Antivirus
5.       Kaspersky Lab Internet Security 2017
6.       Sophos Home Free Antivirus
7.       Panda Free Antivirus
8.       Comodo Antivirus
9.       Check Point ZoneAlarm Free Antivirus + Firewall
10.   Microsoft Windows Defender

Wednesday, March 29, 2017




UEFI: Unified Extensible Firmware Interface
BIOS: Basic Input/output System
The advantages of UEFI

·         A powerful pre-boot environment capable of running applications
·         Modular design
·         CPU-independent architecture (Itanium, x86, x86-64, ARM Arch32, Arm Arch64)
·         BIOS interface compatibility and legacy booting
·         The ability to boot from disks larger than 2TiB (note the difference between 2TB and 2TiB)

MBR: Master Boot Record
GPT: GUID Partition Table
ESP: EFI System Partition

The legacy BIOS systems are only able to boot from MBR partition tables (there are exceptions, but this is generally a rule) and the MBR specification can only address up to 2TiB of disk space, which results in a BIOS system only being able to boot from disks of 2TiB or smaller.
Other disadvantages of MBR formatted disks include a limited number of bootable partitions and a single pointer to a bootloader/boot manager.
The GPT specification allowed the disks of significantly larger size (several orders of magnitude, up to Zettabytes in size) due to its larger bit allotment for partition addressing, 64B instead of the 16B used by MBR. GPT can partition disks of varying sizes depending on the sector size. This is due GPT addressing sectors as opposed to individual bits or bytes.

Tuesday, March 28, 2017












Because the initial state of the computer we had two difference small size capacity of floppy disk 5.25inch [1.2MB] and 3.5 inch [1.44MB]. We named those are A and B. Then we got permanent default high capacity drive. We named that as C Drive.

Floppy Disk Storage:
Invention in 1967.
After 1980 we avoided to use floppy disks. 
Types of drives include
·         1.44 MB 3.5 inch drive
·         2.88 MB 3.5 inch drive
·         720KB 3.5 inch drive
·         1.2 MB 5.25 inch drive
·         360KB 5.25 inch drive
·         80KB 8 inch drive



Categories

Powered by Blogger.

Virtual Private Network (VPN)

Virtual Private Network (VPN) A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less se...

Search This Blog

Contact Me

Facebook
Twitter
LinkedIn
kirupathiran(skype)
kirubathiran@gmail.com
kirubathiran@univ.jfn.ac.lk
+(94)773580936
Google Site

Popular Posts

Recent Posts

Recent Posts Widget

Instagram

Followers

Video

Widget