Skip to main content

FULL FORMS OF THE FOLLOWING NETWORKING TERMS:

 SSL– Secure Sockets Layer

IMAP– Internet Message Access Protocol

FTP– File transfer protocol-

WiFi– Wireless Fidelity

HTTPs– Hyper Text Transfer Protocol Secure

WAP– Wireless Application Protocol

VoIP– Voice Over Internet Protocol

SMTP– Simple Mail Transfer Protocol

TDMA– Time Division Multiple Access

CDMA– Code Division Multiple Access

TCP/IP– Transmission Control Protocol/Internet Protocol

LAN– Local Area Network

WAN– Wide Area Network


MAN– Metropolitan Area Network

PAN– Personal Area Network

IR– Infrared

IRC– Internet Relay Chat

GPRS– General Packet Radio Service

GSM– Global System for Mobile Communications

e-mail– Electronic Mail

ASP– Active Server Pages

JSP– Java Server/Script Pages

XML– eXtensible Markup Language

HTML– Hyper Text Markup Language

Bps– Bytes per Second

bps– bits per second

ARPAnet– Advanced Research Project Agency Network

POP– Post office Protocol

nfc– Near field Communication

sms-short message service

Comments

Popular posts from this blog

Ethical Hacking Gadgets top 10

👉Ethical hacking often involves using hardware for security testing and analysis purposes. Here are some common ethical hacking hardware tools: 1. 👉**USB Rubber Ducky:** A keystroke injection tool used for automating keystrokes. 2. **LAN Turtle:** Network penetration testing device for remote access. 3. **Alfa Network Adapters:** USB or PCIe adapters for wireless penetration testing. 4. **Raspberry Pi:** Versatile single-board computer useful for various security tasks. 5. **Hak5 Pineapple:** Wireless penetration testing tool for Wi-Fi networks. 6. **USB Armory:** Open-source USB-sized computer for security applications. 7. **Proxmark3:** RFID/NFC manipulation tool for testing proximity card systems. 8. **Bash Bunny:** USB attack and automation platform. 9. **YubiKey:** Hardware security key for two-factor authentication. 10. **LandTurtle:** Inline penetration testing device for network security assessments. Always ensure that you have proper authorization and fol...

āĻ–েāϞাāϧুāϞা, āĻŦিāϟāĻ•āϝ়েāύ āĻāĻŦং āĻĢিāύাāύ্āϏেāϰ āĻŽāϤো āĻŦিāĻ­াāĻ—ে āĻŦিāĻ­িāύ্āύ āĻŦিāώāϝ় āĻāĻŦং āχāĻ­েāύ্āϟে āĻŦাāϜি āϧāϰāϤে āĻāχ āĻ…্āϝাāĻĒāĻ—ুāϞি āϏেāϰা āĻ“ āχāύ্āĻĄিāϝ়াāύ

1.āĻāχ āĻŦিāύাāĻŽূāϞ্āϝেāϰ āĻ…্āϝাāĻĒāϟি āĻŦ্āϝāĻŦāĻšাāϰāĻ•াāϰীāĻĻেāϰ āĻ­āĻŦিāώ্āϝāĻĻ্āĻŦাāĻŖী āĻ•āϰে āĻāĻŦং āϤাāĻĻেāϰ āĻŽāϤাāĻŽāϤ āϟ্āϰেāĻĄ āĻ•āϰে āĻ…āϰ্āĻĨ āωāĻĒাāϰ্āϜāύ āĻ•āϰāϤে āĻĻেāϝ়। āĻĒ্āϰোāĻŦোāϰ āĻŽাāϧ্āϝāĻŽে, āĻŦ্āϝāĻŦāĻšাāϰāĻ•াāϰীāϰা āĻŦিāύোāĻĻāύ, āĻ–েāϞাāϧুāϞা, āĻŦিāϟāĻ•āϝ়েāύ āĻāĻŦং āĻĢিāύাāύ্āϏেāϰ āĻŽāϤো āĻŦিāĻ­াāĻ—ে āĻŦিāĻ­িāύ্āύ āĻŦিāώāϝ় āĻāĻŦং āχāĻ­েāύ্āϟে āĻŦাāϜি āϧāϰāϤে āĻĒাāϰে। āĻ…্āϝাāĻĒāϟি āĻŦ্āϝāĻŦāĻšাāϰāĻ•াāϰীāĻĻেāϰ āϤাāĻĻেāϰ āϚাāϰāĻĒাāĻļেāϰ āĻŦিāĻļ্āĻŦ āĻŦুāĻāϤে āĻāĻŦং āϤাāĻĻেāϰ āϜ্āĻžাāύ āĻĨেāĻ•ে āωāĻĒāĻ•ৃāϤ āĻšāϤে āϏাāĻšাāϝ্āϝ āĻ•āϰাāϰ āϜāύ্āϝ āĻĄিāϜাāχāύ āĻ•āϰা āĻšāϝ়েāĻ›ে। 2 .MPL āĻ“āĻĒিāύিāϝ়ো āĻāĻ•āϟি āĻŦিāĻļেāώāϜ্āĻžেāϰ āĻŽāϤাāĻŽāϤ āĻ­িāϤ্āϤিāϰ āĻ—েāĻŽ, āϝেāĻ–াāύে āφāĻĒāύাāĻ•ে āĻ•্āϰিāĻ•েāϟ, āĻ•্āϰিāĻĒ্āϟো āĻŦা āĻ…āύ্āϝাāύ্āϝ āϟ্āϰেāύ্āĻĄিং āĻŦিāώāϝ়েāϰ āĻŽāϤো āĻŦিāĻ­িāύ্āύ āĻŦাāϏ্āϤāĻŦ āϘāϟāύা āϏāĻŽ্āĻŦāύ্āϧে āĻĒোāϞ-āĻ­িāϤ্āϤিāĻ• āĻĒ্āϰāĻļ্āύ āĻ•āϰা āĻšāϝ়। āφāĻĒāύাāĻ•ে āĻāĻ•āϟি āĻŦিāĻ•āϞ্āĻĒ āĻŦেāĻ›ে āύিāϤে āĻšāĻŦে, āϝেāϟি āφāĻĒāύাāϰ āĻŽāϤাāĻŽāϤ āĻ…āύুāϝাāϝ়ী āϘāϟāϤে āĻĒাāϰে।

āϟেāϞিāĻ—্āϰাāĻŽ āĻŦāύাāĻŽ āĻšোāϝ়াāϟāϏāĻ…্āϝাāĻĒ āĻŦāύাāĻŽ āϏিāĻ—āύ্āϝাāϞ

  1.āĻšোāϝ়াāϟāϏāĻ…্āϝাāĻĒ:āĻšোāϝ়াāϟāϏāĻ…্āϝাāĻĒ āφāĻĒāύাāϰ āĻŦাāϰ্āϤা, āĻ•āϞ, āĻĢāϟো āχāϤ্āϝাāĻĻিāϰ āĻŦিāώāϝ়āĻŦāϏ্āϤু āĻĄিāĻ•্āϰিāĻĒ্āϟ āĻ•āϰāϤে āĻĒাāϰে āύা, āĻāχāĻ­াāĻŦে āφāĻĒāύাāϰ āύিāϰাāĻĒāϤ্āϤা āĻāĻŦং āĻ—োāĻĒāύীāϝ়āϤা āύিāĻļ্āϚিāϤ āĻ•āϰে।  āφāĻĒāύাāϰ āϏāĻŽāϏ্āϤ āĻŦাāϰ্āϤা, āĻ­িāĻĄিāĻ“ āĻ•āϞ , āĻ­āϝ়েāϏ āĻ•āϞ āĻāύ্āĻĄ-āϟু-āĻāύ্āĻĄ āĻāύāĻ•্āϰিāĻĒāĻļāύ 2. āϟেāϞিāĻ—্āϰাāĻŽ: āϟেāϞিāĻ—্āϰাāĻŽ āϤাāϰ āĻŦ্āϝāĻŦāĻšাāϰāĻ•াāϰীāĻĻেāϰ āĻ•িāĻ›ু āϏুāϰāĻ•্āώা āĻĒ্āϰāĻĻাāύ āĻ•āϰে।āĻ—োāĻĒāύ āϚ্āϝাāϟে āĻĒাāĻ াāύো āĻŦাāϰ্āϤাāĻ—ুāϞি E2E āĻāύāĻ•্āϰিāĻĒ্āϟ āĻ•āϰা āĻšāϝ়, āϝা āϚāĻŽā§ŽāĻ•াāϰ, āĻ•িāύ্āϤু āύিāϝ়āĻŽিāϤ āϚ্āϝাāϟ āĻšāϝ় āύা। āĻāϰ āĻŽাāύে āĻšāϞ āϝে āĻŦাāϰ্āϤাāĻ—ুāϞি āφāĻĒāύাāϰ āĻĄিāĻ­াāχāϏে āĻāύāĻ•্āϰিāĻĒ্āϟ āĻ•āϰা āĻšāϝ়েāĻ›ে āĻāĻŦং āϤাāϰāĻĒāϰে āϏেāĻ—ুāϞি āϟেāϞিāĻ—্āϰাāĻŽেāϰ āϏাāϰ্āĻ­াāϰে āĻĄিāĻ•্āϰিāĻĒ্āϟ āĻ•āϰা āĻšāϝ়েāĻ›ে৷ āφāĻŦাāϰ, āĻŦাāϰ্āϤাāĻ—ুāϞি āϏাāϰ্āĻ­াāϰে āĻāύāĻ•্āϰিāĻĒ্āϟ āĻ•āϰা āĻšāϝ় āĻāĻŦং āϚূāĻĄ়াāύ্āϤ āĻĄিāĻ•্āϰিāĻĒāĻļāύেāϰ āϜāύ্āϝ āĻĒ্āϰাāĻĒāĻ•েāϰ āĻĄিāĻ­াāχāϏে āĻĒাāĻ াāύো āĻšāϝ়। āφāĻĒāύি āĻĻেāĻ–āϤে āĻĒাāϚ্āĻ›েāύ, āĻāχ āĻĒ্āϰāĻ•্āϰিāϝ়াāϝ়, āϟেāϞিāĻ—্āϰাāĻŽেāϰ āϏাāϰ্āĻ­াāϰ-āϏাāχāĻĄে āĻāύāĻ•্āϰিāĻĒāĻļāύ āĻ•ী āϰāϝ়েāĻ›ে āĻāĻŦং āϤা āϤāϤ্āϤ্āĻŦāĻ—āϤāĻ­াāĻŦে, āφāĻĒāύাāϰ āϏ্āĻŦাāĻ­াāĻŦিāĻ• āϚ্āϝাāϟāĻ—ুāϞি āĻ…্āϝাāĻ•্āϏেāϏ āĻ•āϰāϤে āĻĒাāϰে। 3. āϏিāĻ—āύ্āϝাāϞ: āύিāϰাāĻĒāϤ্āϤাāϰ āĻ•্āώেāϤ্āϰে āϏিāĻ—āύ্āϝাāϞ āĻāĻ–āύ āĻĒāϰ্āϝāύ্āϤ āϏেāϰা, āĻ•েāω āϜাāύāϤে āĻĒাāϰāĻŦে āύা - āĻāĻŽāύāĻ•ি āϏিāĻ—āύ্āϝাāϞāĻ“ āύāϝ় - āĻ•ে āĻ•াāĻ•ে āĻŽেāϏেāϜ āĻ•āϰāĻ›ে āĻŦ্āϝāĻŦāĻšাāϰāĻ•াāϰীāϰ āĻ—োāĻĒāύীāϝ়āϤা āϰāĻ•্āώা āĻ•āϰাāϰ āϜāύ্āϝ, āϏিāĻ—āύ্āϝাāϞ āĻĒ্āϰেāϰāĻ• āĻāĻŦং āĻĒ্āϰাāĻĒāĻ•েāϰ āĻŽāϧ্āϝে āϝোāĻ—াāϝোāĻ—েāϰ āĻāĻ•āϟি āύāϤুāύ āωāĻĒাāϝ় āϤৈāϰি āĻ•āϰেāĻ›ে āϏিāĻ—āύ্āϝাāϞ