Skip to content
FOSSBYTES-TECH-SIMPLIFIED-LOGO
  • Guides
  • Best of Lists
  • Explained
  • Reviews
  • Sponsored
  • Stories
FOSSBYTES-TECH-SIMPLIFIED-LOGO
Home / Amar Shekhar - Page 2

Author: Amar Shekhar

A passionate adventure traveller over Trekkerpedia.com and Author of the book 'The Girl from the Woods'.
Inside a Router
What is

Routing: How Do Packets Travel And What Happens Inside a Router?

ByAmar Shekhar December 14, 2017July 28, 2021

If we talk about the computer networks, then it is incomplete without Routing. It is often…

Read More Routing: How Do Packets Travel And What Happens Inside a Router?Continue

Point to Point Protocol
What is

PPP (Point to Point Protocol): Components And Characteristics You Should Know About

ByAmar Shekhar December 6, 2017

Often termed as “PPP,” point to point protocol is a data link layer protocol which is…

Read More PPP (Point to Point Protocol): Components And Characteristics You Should Know AboutContinue

atm in computer networks
Tech What is

ATM In Computer Networks: History And Basic Concepts

ByAmar Shekhar November 14, 2017

TM, also known as Asynchronous Transfer Mode, is a telecommunication concept, developed for the data link layer,…

Read More ATM In Computer Networks: History And Basic ConceptsContinue

Google translate service as a proxy server
How To

How To Use Google Services As Proxy Server To Bypass Paywalls, Download Files

ByAmar Shekhar February 3, 2017April 14, 2022

Short Bytes: There are different ways to use many services from Google as proxy servers to…

Read More How To Use Google Services As Proxy Server To Bypass Paywalls, Download FilesContinue

web cache
Tech

How Does Web Caching Work — A Brief Introduction

ByAmar Shekhar August 24, 2016April 21, 2017

Short Bytes: Web caching is a network technology to deliver content faster to the web page…

Read More How Does Web Caching Work — A Brief IntroductionContinue

windows 10 command prompt
How To

How To Enable Ctrl+C / Ctrl+V For Copy-Pasting In Windows Command Prompt

ByAmar Shekhar July 1, 2016February 13, 2022

The copy-paste feature using the Ctrl+C/ Ctrl+V commands is one of the most used features of a…

Read More How To Enable Ctrl+C / Ctrl+V For Copy-Pasting In Windows Command PromptContinue

type of computer networks
What is

Types Of Networks: Trusted, Untrusted, And Unknown Networks

ByAmar Shekhar June 23, 2016March 27, 2017

Short Bytes: Firewall packet filtering rules are applied based on the integrity of the networks. There are three…

Read More Types Of Networks: Trusted, Untrusted, And Unknown NetworksContinue

Application layer attacks types
Security

What Are The Different Types Of Application Layer Attacks?

ByAmar Shekhar June 22, 2016March 27, 2017

Short Bytes: Application layer attacks are the most favored ways of launching an attack. It just…

Read More What Are The Different Types Of Application Layer Attacks?Continue

worlds fastest ic
Science

Scientists Create World’s Fastest Wearable IC To Revolutionize IoT

ByAmar Shekhar May 30, 2016

Short Bytes:  The world’s fastest and stretchable IC has been created by a group of researchers at…

Read More Scientists Create World’s Fastest Wearable IC To Revolutionize IoTContinue

tesla gigafactory
Tech

Tesla Gigafactory: Elon Musk’s Another Innovation On The Run

ByAmar Shekhar May 28, 2016May 29, 2016

Short Bytes: To meet its upcoming projected production of the electric cars, Tesla is going to…

Read More Tesla Gigafactory: Elon Musk’s Another Innovation On The RunContinue

Page navigation

Previous PagePrevious 1 2 3 4 … 16 Next PageNext
  • About Us
  • Contact Us
  • Jobs
  • Privacy Policy
  • Cookie Policy
  • Editorial Policy
  • Terms of Service

© 2025 Fossbytes Media

Instagram Threads Facebook YouTube Twitter Linkedin
  • Guides
  • Best of Lists
  • Explained
  • Reviews
  • Sponsored
  • Stories
Search