The RED algorithm is also known as Random Early Discard or Random Early Drop. This algorithm works at the router...
Congestion of the network is a phenomenon which consists of deterioration of the quality of services caused by the overloading...
1. Primary access rights in Linux 2. Capabilities in Linux 3. Testing capabilities in Linux 1. Primary access rights in...
The File Transfer Protocol or FTP is a protocol used to access files on servers from private computer networks or...
MD5 (Message Digest Algorithm 5) is a unidirectional hash-like cryptographic function that delivers a fixed 128-bit length value. The value...
A network protocol is a set of rules that computers must follow to change the information in a network. Network...
The Netstat command is one of the most powerful utilities that are offered in search of a secure network configuration....
Inetd is a super-server daemon found on many UNIX systems. It first appeared on BSD version 4.3 and is usually...
RTCP is a protocol that only deals with answers, syncing data, and the user interface but does not carry data...
User Datagram Protocol or UDP is a communication protocol for computers that belongs to the Transport Level of the standard...
Leafpad is a minimalist text editor for Unix-like operating systems that has little dependency on other software. Leafpad was developed...
ZFS is a local file system and logical volume manager to direct and control the placement, storage, and retrieval of...