Kshitij Khankakshitijkhanka.hashnode.dev·Mar 24, 2024Everything about Blockchain - Week 1 of LearningAfter reading this blog, you will learn about — Blockchain basics and properties, Hashing algorithms, Mining, Distributed P2P Network & Gas Fees. Side context : This marks the beginning of exploring and diving deep into Blockchain, Protocols, Cryptog...Discuss·1 likeBlockchain
Nehal IngoleforRead & Learnlearnwithnehal.hashnode.dev·Mar 15, 2024An In-Depth Exploration of How the Internet WorksIntroduction The internet stands as a pinnacle of human achievement, revolutionizing the way we communicate, collaborate, and access information. However, beneath its seemingly seamless facade lies a complex labyrinth of interconnected systems and pr...DiscussNodeISPs
Jay Tillujaytillu.in·Mar 15, 2024What is SMTP in Networking?SMTP, or Simple Mail Transfer Protocol, is the standard protocol used for sending email messages across networks. SMTP isn't directly involved with how you view or manage your emails. Instead, it acts as the communication channel between email client...DiscussNetworkingSecurity
Jay Tillujaytillu.in·Mar 15, 2024What is Internet Message Access Protocol (IMAP)?Imagine checking your work email on your computer, then replying to the same message later from your phone, and finding it seamlessly updated on both devices. This magic lies in a clever protocol called IMAP (Internet Message Access Protocol). IMAP: ...DiscussNetworkingprotocols
Jay Tillujaytillu.in·Mar 11, 2024Understanding Network Protocols: The Backbone of Modern CommunicationIn today's interconnected world, where communication between devices and systems is fundamental, network protocols play a crucial role. Whether you're browsing the web, sending an email, or streaming a video, network protocols quietly facilitate the ...DiscussNetworkingnetworking
Harsh Mangeharshmange.hashnode.dev·Mar 6, 2024Demystifying Concurrency Control Protocols!Concurrency control protocols (CCP) are mechanisms that are used in database management systems to manage the concurrency of transactions accessing shared data. CCPs are used to ensure that multiple transactions do not interfere with each other when ...Discussconcurrency
Basel Rabiabaselrabia.hashnode.dev·Mar 3, 2024Structure Data with Protocol Buffers in GoLangWhen building distributed services, you’re communicating between the services over a network. To send data (such as your structs) over a network, you need to encode the data in a format to transmit, and lots of programmers choose JSON. When you’re bu...Discuss·152 readsgolang
Jay Tillujaytillu.in·Mar 2, 2024What is the TCP/IP Model?Have you ever wondered how your computer talks to other computers across the vast expanse of the internet? It all boils down to a clever system called the TCP/IP model, the unsung hero behind every website you visit, email you send, and video you str...DiscussNetworking#cybersecurity
Reza RashidiforRedTeamReciperedteamrecipe.com·Mar 1, 2024Trended Protocols for Security StuffNetwork Protocols: IDProtocolSecurity Attack VectorSecurity Issues Score 1TelnetMan-in-the-Middle Attacks70 2SNMPv1Information Disclosure65 3NetBIOSNetwork Reconnaissance60 4SMBv1Remote Code Execution80 5WEPWireless Data Interception75 6A...Discuss·1.4K readsredteaming
Jay Tillujaytillu.in·Feb 29, 2024What is TCP/IP Protocol?TCP/IP stands for Transmission Control Protocol/Internet Protocol is the fundamental communication protocol that allows computers and devices to exchange data over the Internet. It is the most commonly used protocol in the world for transmitting data...DiscussNetworkingnetworking