Professional Documents
Culture Documents
GPS: Global Positioning System. The System Consists of 24 Navstar Satellites That Orbit
GPS: Global Positioning System. The System Consists of 24 Navstar Satellites That Orbit
The GPS costs you very low in comparison other navigation systems.
It also helps you to search the nearby restaurants, hotels and gas
stations and is very useful for a new place.
Due to its low cost, it is very easy to integrate into other technologies
like cell phone.
DISADVANTAGES
Sometimes the GPS may fail due to certain reasons and in that case you need to
carry a backup map and directions.
If you are using GPS on a battery operated device, there may be a battery failure
and you may need a external power supply which is not always possible.
Sometimes the GPS signals are not accurate due to some obstacles to the signals
such as buildings, trees and sometimes by extreme atmospheric conditions such as
geomagnetic storms.
Communication Protocols
When two dissimilar computers systems communicate with each other they require a
standard set of instructions for communicating with each other and these instructions are
known as protocols. Protocols are the communications standards and the set of rules that
source and destination computers must abide by and follow in order to communicate with
each other. They determine that how data will be transmitted between two computer
computers.
Telnet
Telnet client is used to access remote servers. However, unlike HTTP, where you
only request specific files, Telnet is used to actually log on to the remote server
and perform functions as if you were sitting in front of the server terminal. Telnet
is rarely used now since it is an unsecure protocol that does not encrypt data sent
between remote computers.
Primarily used to transfer files such as documents, images, music, etc., between
remote computers. Users have to log on to an FTP server either through a
command line interface or through one of the many FTP graphical client
programs available. Once logged on, users can navigate through the remote
server's file structure, moving, renaming, deleting, and copying files as if it were
their own computer.
IP Security (IPSec)
IP Security (IPSec) protocols encrypt packets of data and send them between two
computers that share the same cryptographic keys. IPSec protocols are used in
Virtual Private Networks.
VPN Type of Network that allows employees of a company to log on to
their company's secure network through a public network (e.g. from home or a
coffee shop.)
Email Protocol
Email protocols are the languages and rules that email servers and clients use to
communicate with each other and manage incoming and outgoing mail. These protocols
are strictly defined and are in use in a variety of different email clients. In addition, each
email protocol has a unique way of managing email that is sent and received from an
email account.
Post Office Protocol (POP) is an email protocol that has been in existence longer
than many other protocols. POP uses the email server as a temporary waiting
place and then forwards all of your emails to your computer and removes them
from the server.
can access your email from multiple computers, such as a home and work
computer and a mobile device
Simple Mail Transfer Protocol (SMTP) is a specialized email protocol. Both POP
and IMAP use SMTP to manage outgoing (sent) email.
Malware Distribution: Hackers with malicious intent can exploit your email
client by distributing malware through email messages. The malware includes
viruses, worms, rootkits, Trojans, keyloggers, spyware, and adware, to name a
few types. The malware is distributed via an email attachment or sometimes by
simply opening an email message. More often than not, the mail message is
disguised as a message from someone you know when in reality; it is sent by the
hacker.
Spam Attack: Spam is unsolicited email or "junk" mail that you receive in your
Inbox. Spam generally contains advertisements but it can also contain malicious
files. When you click on spam, the files are downloaded into your email client and
into your PC. The same thing can happen if you reply to spam in an attempt to get
removed from the list.
Denial of Service Attack: A denial of service attack occurs when the hacker
sends multitudes of email messages to your email client in an effort to block you
from using your email client or crashing your computer altogether. In the case of
an organization, a denial of service attack on email can crash an entire network
and prevent the users from responding to legitimate traffic.
*ransomware,
*worms,
* trojan horses,
*rootkits,
* keyloggers,
*dialers,
*spyware,
*adware,
*malicious BHOs,
the majority of active malware threats are usually worms or trojans rather
than viruses. In law, malware is sometimes known as a computer
contaminant, as in the legal codes of several U.S. states. Malware is
different from defective software, which is a legitimate software but
contains harmful bugs that were not corrected before release.
Make sure automatic updating is turned on to get all the latest security updates.
Keep your firewall turned on.
Email client
Also called email reader, or more formally mail user agent (MUA), is a
computer program used to access and manage a user's email.
The term can refer to any system capable of accessing the user's email mailbox,
regardless of it being a mail user agent, a relaying server, or a human typing on a
terminal. In addition, a web application that provides message management,
5