Archives: Theory

Web Browser

The role of a web browser A web browser is a software program which allows the user to request and retrieve web pages (and other resources) from a webserver on the world wide web. Web…

Computer Ethics

Computer ethics refers to a set of principles to regulate the use of computers. Ethics has become an important consideration due to the spread of computerised systems and electronic communications. Computer ethics can be broken…

Secure Sockets Layer

Secure Sockets Layer (SSL) uses authentication and encryption to create a widely used online security protocol.  SSL allows data to be sent and received securely over the internet. SSL consists of a digital certificate, hosted…

Hacking and Malware

Hacking Hacking is the illegal access to a computer system without the owner’s consent or knowledge. In an age of networks that never sleep, hacking can be done remotely from anywhere. Hacking poses a real threat to people…

Proxy Servers

Proxy servers act as an intermediary between a user and a web server. Proxy servers have the following main functions: Using cache, they can speed up access to a website by storing the pages after the…

Firewalls

Firewalls are security systems designed to prevent unauthorised access to or from your computer or private network. Firewalls can be implemented in hardware, software or a combination of both. Firewalls sit between the user’s computer and…

The Need for Security

Whether it be personal or commercial, data is really valuable so it is important to keep it safe. Data is sometimes deleted or corrupted accidentally, but this can also happen as the result of malicious actions. Either…

Serial and Parallel Data Transmission

Data transmission can occur in two modes (methods), either serial or parallel. Serial data transmission In serial data transmission, bits are sent sequentially (one after the other) down the same wire (channel). Using a single…

Popular Tags

Categories

  • No categories

Archives