Network Threat : The Trojan Horse

What is a Trojan Horse ? A trojan horse is used to enter a victim’s computer, granting the attacker ‘wrapped’ into a program meaning that this program may therefore have hidden fuctions that you are not aware of.unrestricted access to the data stored on that computer...

Different types of RJ 45 crimping

Difference between Straight Through , Crossover And Rollover Cables There are generally three main types of networking cables. Straight-through, Crossover , and rollover cables . Each cables type has a distinct use , and should not be used in place of...

Pin It on Pinterest