Kioskea
Recherche
Search
All topics
Results 1 - 20 of about 778
  • PC assembly - Installing the motherboard

    The motherboard The motherboard is screwed into the casing. Small risers, called spacers or mounting screws, come with the motherboard and are used to keep a space between the motherboard and the case. These risers are plastic points ... Read more

    Computer: assembly
    October 16, 2008 09:43 AM
  • PC assembly - Inserting memory modules

    ... -supported RAM into the motherboard as each memory type has one ... several notches that prevent it from being inserted into the wrong ... Read more

    Computer: assembly
    October 16, 2008 09:43 AM
  • PC assembly - Inserting expansion cards

    ... use this type of slot as the bus runs at a ... Read more

    Computer: assembly
    October 16, 2008 09:43 AM
  • PC Assembly - Installing the processor

    The processor The processor is the computer's key integrated circuit which performs the main calculations. Processors come in various formats which can be grouped into two families: Socket processors Slot processors ZIF socket When ... Read more

    Computer: assembly
    October 16, 2008 09:43 AM
  • PC Assembly

    ... made by different manufacturers, so as to have a custom built ... Read more

    Computer: assembly
    October 16, 2008 09:43 AM
  • PC Assembly - Organising drives and cables

    Organising internal components Hard drives and other internal devices (floppy disk drive, CD-ROM/DVD-ROM drives or burners) may be installed in any internal drive bay. However, installation of these devices may be restricted by the ... Read more

    Computer: assembly
    October 16, 2008 09:43 AM
  • PC Assembly - Getting the case ready

    ... , finally remove all plastic blanks from the drive bays at the ... Read more

    Computer: assembly
    October 16, 2008 09:43 AM
  • Man in the middle attack

    ... to this type of attack. As such, every time one of ... Read more

    Attacks
    October 16, 2008 09:43 AM
  • LAND attack

    ... attack" is a network attack dating from 1997 using IP address spoofing ... name of this attack comes from the name given to the ... Read more

    Attacks
    October 16, 2008 09:43 AM
  • Ping of death attack

    Ping of death attack The ping of death attack is one of the oldest network attacks. The principle of ping of death simply involves creating an IP datagram whose total size exceeds the maximum authorized size (65,536 bytes). When such a ... Read more

    Attacks
    October 16, 2008 09:43 AM
  • Smurf attack

    ... of such an attack is as follows: the attacking machine sends ... Read more

    Attacks
    October 16, 2008 09:43 AM
  • SYN attack

    SYN attack The "SYN attack" (also called "TCP/SYN Flooding") is a network saturation (denial-of-service) attack that exploits the Three-way handshake mechanism of the TCP protocol. The three-way handshake is the way in which any "reliable ... Read more

    Attacks
    October 16, 2008 09:43 AM
  • Teardrop attack

    ... offset information into fragmented packets. As a result, during reassembly, there ... Read more

    Attacks
    October 16, 2008 09:43 AM
  • Web server attacks

    ... be accessed on the web from a simple browser. Now the ... Read more

    Attacks
    October 16, 2008 09:43 AM
  • Introduction to attacks

    ... attacks are mostly launched automatically from infected machines (by viruses, Trojan ... Read more

    Attacks
    October 16, 2008 09:43 AM
  • Vulnerability scanners - Port scanning

    Port scanning A "vulnerability scanner" (sometimes called a "network analyzer") is a utility program that makes it possible to perform a security audit on a network by scanning for open ports on a given machine or an entire network. The ... Read more

    Attacks
    October 16, 2008 09:43 AM
  • Buffer overflow attacks

    ... some read functions, such as strcpy() functions from the C language, cannot ... of attack is extremely complicated as it requires in-depth knowledge ... Read more

    Attacks
    October 16, 2008 09:43 AM
  • Cross-Site Scripting attacks

    ... the website's behavior, so as to display a personalized error ... call a site with such as flaw Read more

    Attacks
    October 16, 2008 09:43 AM
  • Denial of service attack

    ... and to potentially keep them from operating properly if their activity ... Read more

    Attacks
    October 16, 2008 09:43 AM
  • Exploits

    ... a version of an application as it exploits flaws in that ... Read more

    Attacks
    October 16, 2008 09:43 AM