What is Content Disarm & Reconstruction (CDR)
Today, almost all cyber attacks take place in order to access information. At this stage, the security of the files…
Today, almost all cyber attacks take place in order to access information. At this stage, the security of the files…
Every router must implement a queuing discipline that manages how packets are buffered while waiting to be transmitted. Various queuing…
As mentioned in detail in my previous article, QoS is a network service that aims to reduce time loss by…
Managing infrastructure is a core requirement for most modern applications. A large number of hardware must be managed correctly in…
FIREWALL A firewall is a network device that works on the 3rd and 4th OSI Layers, namely Network and Transmission…
The cyber threat landscape is growing rapidly, and organizations around the world are struggling to find the protection they need…
API is a technology that hides the complexity in software from software developers, allows the codes to be edited without…
Virtualization Digitalization is no longer a choice for businesses in line with the demands of their customers and the experiences…
IDS IDS, Intrusion Detection System, recognizes threats and movements within the network that may be an attack. Recognized threats are…
The network work architecture is similar to an operating system in its working structure. For this reason, network devices use…
QoS is the services that will be applied to traffic in order to provide efficient, sufficient, and quality service in…
Layer 3 devices (Layer3 Switch or Router) do “Forwarding” for packet transmission. Forwarding refers to how the router device in…
STP (Spanning Tree Protocol) is the IEEE 802.1 standard. It is a protocol discovered to prevent loops that may occur…
In cases where a special connection is not established between the devices and there are common connections in communication, more…
Transformator The transformer is used to measure and control the level of voltage or current in alternating current circuits. The…
YOU CAN NOT COPY THAT TEXT !
COPYRIGHT TO EMRE CICEK.