When we talk about encrypted communication, we have to keep in mind two parties primarily; the sender and the receiver. The former encrypts and the latter decrypts. Described as the foundation of Public Key Infrastructure (PKI), Asymmetric Encryption key provides ...
Snabay Networking Latest Articles
What is Symmetric Encryption Algorithms

Encryption is as essential for your data as a key is essential for a lock that protects your house. Symmetric Encryption uses the Symmetric Key to encrypt and decrypt information and Algorithms are a part of this whole process that ...
Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Standard

IEEE 802.11 Wireless Standard: The Institute of Electrical and Electronics Engineers or the IEEE is a New York-based international professional association of electrical engineers and electronic engineering formed in 1963. IEEE 802.11 is a part of a LAN Protocol standard ...
What is a Honeypots in Network Security

If you look up the history of cyber crimes(honeypots), there you can find a lot of creative and unique ways that attackers use to victimize their targets. With the possibility of different types of attacks targeting different functions and trying ...
Named Access List Configuration (Named ACL) | Cisco Named ACL

This section, briefly explains the creation and configuration of the extended named access control list. Based on the source address and the destination address traffics can be denied or can be permitted in extended named access control lists. All the ...
What is Email Security, Data Protection

Perhaps the most sophisticated form of communication in today’s world is the e-mail which also seems to a legitimate successor to the letters. Based on the same format and writing style, email is not more than an electronic form. For ...
Difference Between Half Duplex and Full Duplex Switching Mode | Examples of Half and Full Duplex

The most incredible and effective function in machines is their ability to communicate and work with each other just like human beings despite not having an intellect and intelligence of their own. The communication between or over two devices is ...
How to Connect Cisco Router step by step

How to Connect Cisco Router step by step In this tutorial you able to learn how to connect and set up the Cisco router step by step so keep reading this article till the end, At the end of the ...
All Show Commands in Cisco Switch and Router

Cisco router runs on an operating system called the IOS (Internetwork Operating System).To enable the administrator to retrieve information and change the device’s settings. One of the most powerful command in IOS is Show. To know All Show Commands in ...
Collision Domain and Broadcast Domain

Collision Domain And Broadcast Domain plays an important role in networking when the device send and receive the data from each other. Collision Domain Collision Domain is a set of LAN devices whose frames could collide with one another. This ...