Skip to main content

What is Network Sharing and Security?

Network Sharing and Security

Network Sharing: Network sharing is a feature that allows sharing of resources over a network, such as files, documents, folders, media, etc. It is made accessible to other user computers on networks. Network sharing enables data to be accessed across multiple devices or at the same time. By connecting a device to a network, other user devices on the network can share and exchange information through the network.

File Sharing: File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images, and video), documents, or e-books. File sharing can be saved in different ways. Common methods of storage, transmission, and dissemination are manual sharing uses such as removable media, centralized computer servers, web-based hyperlinked documents, and distributed peer-to-peer networking.


Network Sharing in Windows Operating System: Windows 7 and Windows 8x have the same network sharing settings. They are found in the same place, but their order is different. First, go to “Control Panel > Network and Internet” and then go to Network and Sharing Center. This window is very important when setting up network connections and network sharing. Here are links to network adapter settings, all network sharing settings, and new For connection or troubleshooting issues, change wizard options can be found. To access settings for network sharing, click the “Change advanced sharing settings” link in the left column.

A list will appear with all network sharing settings available in Windows, grouped by network location.


Network Security:

In the early days of the Internet, its use was limited to research and development in the military and universities. Later, when all the networks came together to form the Internet, the information system became open to the public. Very sensitive information and data, people's banks and markets, name-passwords, personal matters, all these fell into security risk. All security risks are objective, they can be divided into several categories. Interruption: Inability to access a site or similar problems. Violation of privacy is the entry into someone's private domain or receiving information without their permission or without notice.

Integrity: Matters related to data correction or access to the system by a person who has actual rights.

Authenticity: When an attacker poses as a security breach and threatens the security of another person or organization.

No system in the current world can ensure 100% security, but some measures can be taken to ensure the security of data when it flows over unregulated networks or the Internet. The most used method in this case is cryptography. Cryptography is a technique that encrypts plain text data to make the data difficult to understand and interpret. Several cryptography algorithms are currently available,

(i) Secret Key

(ii) Public key

(iii) Message Digest


Secret key encryption: Sender and receiver share the secret formula (key).

Public Key Encryption: In this encryption system all users have a secret key (key). This is not possible in shared domains.


Message Digest: The actual data is not sent, the symbolic value is sent. The data is determined by perceiving and determining that symbolic value from the receiver end. MD-5 hashing is an example of such a message digest.

Threats in cyber security: The biggest threat in the cyber world is considered to be different types of malware. Know what malware is, how many types it can be, what malware can be recognized by:


(i) Adware: Adware is considered to be the least harmful malware. Adware will basically show various advertisements. Adware will enter the system by installing any software or browser plugin without knowing it. So it is never right to install software and plugins without trusted sources.

(ii) Virus : A virus is a type of program, which is usually attached to another software and then spreads throughout the system. Viruses are often spread from computer to computer through software or file sharing.

(iii) Ransomware : Ransomware will lock your system and demand money for unlock code. (Currently the most talked about |

(iv) Backdoor: Backdoor is a mechanism through which a hacker or spammer can use your network connection.

(v) Key Logger: The job of the key logger is to record everything typed on the computer, user ID, password or any sensitive information and later send all the information to the programmer of the key logger.

(vi) Root Kit : This is a terrible type of malware. It is not easy to catch. Root kits help hide other malware.

(vii) Spyware : Spyware will basically spy on you. Everything from your internet activities.

(viii) Trojan Horse: Trojan is the most dangerous malware of the time. It will steal your financial information. will use your system resources. Trojans are capable of bringing down a system, even a large one.

(ix) Worm : Worm is a kind of eater. Om's Food is the file you need. When a worm enters a drive, it will slowly empty the drive.

(x) Identity Thieves/Phishing: Many times emails with shocking offers arrive in our personal email accounts. We open the mail after seeing the name of a bank, a known organization, a friend, and click on it. Phishing emails steal your personal information. Opening unknown/suspicious emails is risky.






Comments

Popular posts from this blog

What should the processor look at?

The things that we all should keep an eye on are the processor or not; 1. Clock speed 2. Number of course 3. cache memory 4. FBS 1. Clock Speed: It is also called GH2. All processors are written on. Clock speed means how fast your computer can work. That's what this signal means. The speed of the processor is known through this clock speed, how fast the calculation can be done. 2. Number of Cores: The more cores the processor has, the faster the processor can work. If I give an example to explain the matter, I hope you can understand it very easily. Suppose if a person had many hands, then he could do many things at the same time. That is, if we go to the market and buy a smartphone, then we will see what the configurations of the phone are. If we look closely at the configuration of the smartphone, we will see that Dual Core Processor, Quad Core Processor, Octa core processor, Hexa core processor, Deca core processor. This means that the dual core processor has two arms or cores, ...

How to create a google account from a Android mobile?

 I don't believe a long introduction. I don’t want to bore you.  Today I will teach how to create a google account very flexibly from an android device.  Firstly open a browser like Opera, Firefox, Google Chrome or any other it doesn't matter in that and then type create a Gmail account or  click here After clicking here then click on  create an account  option. Write here your first name and last name exactly. Then write an email address uniquely which did not use in the network or google database. After completing the write a unique email address subsequently you will write a password like  @hga34#@ !. This password format is very effective and efficient against brute force or any other intelligence attack. Now click on the next button  Select your country from here      Enter your mobile number in the orange colour selected blank field. Now enter a recovery email address in the selected field. Anytime if your email address passwo...

What is transmission media? Introduction to different types of data transmission cables

Transmission media: When a PC communicates or wants to communicate with another PC, it has to take the help of some transmission media. The most commonly used media in the network are twisted pair cable, coaxial cable, fiber optic cable. Nowadays, the use of optical fiber is increasing greatly. Radio wave, microwave and infrared technologies are prominent among wireless media. Among these mediums, optical fiber has the highest data transfer speed. The type of medium used in a network depends on the type and location of that network. The connection system for exchanging information between the sender and the remote receiving end is called a channel. The means or methods used to implement the channel are called media. such as-- (i) Cable or wire. (ii) Common telephone lines. (ii) Radio waves. (iv) Microwave. (v) Geo-satellite systems etc. Cable or Wire: Cable is an important medium in data communication. Cables are generally used for data transfer over short range networking such as LAN...