Skip to main content

FULL FORMS OF THE FOLLOWING NETWORKING TERMS:

 SSL– Secure Sockets Layer

IMAP– Internet Message Access Protocol

FTP– File transfer protocol-

WiFi– Wireless Fidelity

HTTPs– Hyper Text Transfer Protocol Secure

WAP– Wireless Application Protocol

VoIP– Voice Over Internet Protocol

SMTP– Simple Mail Transfer Protocol

TDMA– Time Division Multiple Access

CDMA– Code Division Multiple Access

TCP/IP– Transmission Control Protocol/Internet Protocol

LAN– Local Area Network

WAN– Wide Area Network


MAN– Metropolitan Area Network

PAN– Personal Area Network

IR– Infrared

IRC– Internet Relay Chat

GPRS– General Packet Radio Service

GSM– Global System for Mobile Communications

e-mail– Electronic Mail

ASP– Active Server Pages

JSP– Java Server/Script Pages

XML– eXtensible Markup Language

HTML– Hyper Text Markup Language

Bps– Bytes per Second

bps– bits per second

ARPAnet– Advanced Research Project Agency Network

POP– Post office Protocol

nfc– Near field Communication

sms-short message service

Comments

Popular posts from this blog

Ethical Hacking Gadgets top 10

👉Ethical hacking often involves using hardware for security testing and analysis purposes. Here are some common ethical hacking hardware tools: 1. 👉**USB Rubber Ducky:** A keystroke injection tool used for automating keystrokes. 2. **LAN Turtle:** Network penetration testing device for remote access. 3. **Alfa Network Adapters:** USB or PCIe adapters for wireless penetration testing. 4. **Raspberry Pi:** Versatile single-board computer useful for various security tasks. 5. **Hak5 Pineapple:** Wireless penetration testing tool for Wi-Fi networks. 6. **USB Armory:** Open-source USB-sized computer for security applications. 7. **Proxmark3:** RFID/NFC manipulation tool for testing proximity card systems. 8. **Bash Bunny:** USB attack and automation platform. 9. **YubiKey:** Hardware security key for two-factor authentication. 10. **LandTurtle:** Inline penetration testing device for network security assessments. Always ensure that you have proper authorization and fol...

āĻ–েāϞাāϧুāϞা, āĻŦিāϟāĻ•āϝ়েāύ āĻāĻŦং āĻĢিāύাāύ্āϏেāϰ āĻŽāϤো āĻŦিāĻ­াāĻ—ে āĻŦিāĻ­িāύ্āύ āĻŦিāώāϝ় āĻāĻŦং āχāĻ­েāύ্āϟে āĻŦাāϜি āϧāϰāϤে āĻāχ āĻ…্āϝাāĻĒāĻ—ুāϞি āϏেāϰা āĻ“ āχāύ্āĻĄিāϝ়াāύ

1.āĻāχ āĻŦিāύাāĻŽূāϞ্āϝেāϰ āĻ…্āϝাāĻĒāϟি āĻŦ্āϝāĻŦāĻšাāϰāĻ•াāϰীāĻĻেāϰ āĻ­āĻŦিāώ্āϝāĻĻ্āĻŦাāĻŖী āĻ•āϰে āĻāĻŦং āϤাāĻĻেāϰ āĻŽāϤাāĻŽāϤ āϟ্āϰেāĻĄ āĻ•āϰে āĻ…āϰ্āĻĨ āωāĻĒাāϰ্āϜāύ āĻ•āϰāϤে āĻĻেāϝ়। āĻĒ্āϰোāĻŦোāϰ āĻŽাāϧ্āϝāĻŽে, āĻŦ্āϝāĻŦāĻšাāϰāĻ•াāϰীāϰা āĻŦিāύোāĻĻāύ, āĻ–েāϞাāϧুāϞা, āĻŦিāϟāĻ•āϝ়েāύ āĻāĻŦং āĻĢিāύাāύ্āϏেāϰ āĻŽāϤো āĻŦিāĻ­াāĻ—ে āĻŦিāĻ­িāύ্āύ āĻŦিāώāϝ় āĻāĻŦং āχāĻ­েāύ্āϟে āĻŦাāϜি āϧāϰāϤে āĻĒাāϰে। āĻ…্āϝাāĻĒāϟি āĻŦ্āϝāĻŦāĻšাāϰāĻ•াāϰীāĻĻেāϰ āϤাāĻĻেāϰ āϚাāϰāĻĒাāĻļেāϰ āĻŦিāĻļ্āĻŦ āĻŦুāĻāϤে āĻāĻŦং āϤাāĻĻেāϰ āϜ্āĻžাāύ āĻĨেāĻ•ে āωāĻĒāĻ•ৃāϤ āĻšāϤে āϏাāĻšাāϝ্āϝ āĻ•āϰাāϰ āϜāύ্āϝ āĻĄিāϜাāχāύ āĻ•āϰা āĻšāϝ়েāĻ›ে। 2 .MPL āĻ“āĻĒিāύিāϝ়ো āĻāĻ•āϟি āĻŦিāĻļেāώāϜ্āĻžেāϰ āĻŽāϤাāĻŽāϤ āĻ­িāϤ্āϤিāϰ āĻ—েāĻŽ, āϝেāĻ–াāύে āφāĻĒāύাāĻ•ে āĻ•্āϰিāĻ•েāϟ, āĻ•্āϰিāĻĒ্āϟো āĻŦা āĻ…āύ্āϝাāύ্āϝ āϟ্āϰেāύ্āĻĄিং āĻŦিāώāϝ়েāϰ āĻŽāϤো āĻŦিāĻ­িāύ্āύ āĻŦাāϏ্āϤāĻŦ āϘāϟāύা āϏāĻŽ্āĻŦāύ্āϧে āĻĒোāϞ-āĻ­িāϤ্āϤিāĻ• āĻĒ্āϰāĻļ্āύ āĻ•āϰা āĻšāϝ়। āφāĻĒāύাāĻ•ে āĻāĻ•āϟি āĻŦিāĻ•āϞ্āĻĒ āĻŦেāĻ›ে āύিāϤে āĻšāĻŦে, āϝেāϟি āφāĻĒāύাāϰ āĻŽāϤাāĻŽāϤ āĻ…āύুāϝাāϝ়ী āϘāϟāϤে āĻĒাāϰে।
 āĻ•িāĻ­াāĻŦে āĻ…āύāϞাāχāύে āφāĻĒāύাāϰ āĻ—োāĻĒāύীāϝ়āϤা āϰāĻ•্āώা āĻ•āϰāĻŦেāύ?   1āĻĒাāϏāĻ“āϝ়াāϰ্āĻĄ:  āĻļāĻ•্āϤিāĻļাāϞী āĻāĻŦং āϏুāϰāĻ•্āώিāϤ āĻ•āϰুāύ। 2.āφāĻĒāύাāϰ āĻĒ্āϰāϝ়োāϜāύেāϰ āϚেāϝ়ে āĻŦেāĻļি āϤāĻĨ্āϝ āĻļেāϝ়াāϰ āĻ•āϰāĻŦেāύ āύা।  3.āφāĻĒāύাāϰ āĻ…্āϝাāĻĒেāϰ āĻ…āύুāĻŽāϤি āĻĒāϰ্āϝাāϞোāϚāύা āĻ•āϰুāύ।  4.āĻ…āύāϞাāχāύে āύিāϰাāĻĒāĻĻে āϜিāύিāϏāĻ—ুāϞিāϰ āϜāύ্āϝ āĻ…āϰ্āĻĨ āĻĒ্āϰāĻĻাāύ āĻ•āϰুāύ।  āĻĢিāĻļিং āϏ্āĻ•্āϝাāĻŽ āϏāĻŽ্āĻĒāϰ্āĻ•ে āϏāϚেāϤāύ āĻĨাāĻ•ুāύ।  5.āĻāĻ•āϟি āĻŦ্āϝāĻ•্āϤিāĻ—āϤ āĻ“āϝ়েāĻŦ āĻŦ্āϰাāωāϜাāϰে āϏ্āϝুāχāϚ āĻ•āϰুāύ।  āφāĻĒāύাāϰ āϏāĻĢ্āϟāĻ“āϝ়্āϝাāϰ āφāĻĒāĻĄেāϟ āĻ•āϰুāύ.  āĻāĻ•āϟি āύিāϰাāĻĒāĻĻ āϏংāϝোāĻ— āĻŦ্āϝāĻŦāĻšাāϰ āĻ•āϰুāύ