Amar Shekhar

Amar Shekhar
335 POSTS 0 COMMENTS
A passionate adventure traveller over Trekkerpedia.com and Author of the book 'The Girl from the Woods'.

Top 10 Common Hacking Techniques You Should Know About

Short Bytes: Using simple hacks, a hacker can know about your personal unauthorized information which you might not want to reveal. Knowing about these...

What Is MPLS (MultiProtocol Label Switching) — The Basic Concepts

MPLS, which stands for Multiprotocol Label Switching, is a data transport method for various protocols on a Packet Switched Network (PSN). If we refer to...

An Overview Of Routing Protocols

A Routing Protocol is a method of negotiation between two routers to select a route between two nodes based on different conditions. Different categories of the...

ATM In Computer Networks: History And Basic Concepts

ATM, also known as Asynchronous Transfer Mode, is a telecommunication concept, developed for the data link layer, to carry all sorts of different kinds of...

ICMP: Error Reporting And Query Fetching Messages

There are so many protocols out there in the computer networks world which focus on the QoS and improving data transmission quality and quantity....

What Is ARP Spoofing? — Attacks, Detection, And Prevention

Spoofing is often defined as imitating (something) while exaggerating its characteristic features for comic effect. Not in the real world but also in the...

Everything You Need To Know About ARP: Address Resolution Protocol

ARP stands for Address Resolution Protocol. ARP is a protocol by which we find out the layer 2 address (link layer address or MAC...

How To Use Google Services As Proxy Server To Bypass Paywalls,...

Short Bytes: There are different ways to use many services from Google as proxy servers to access the locally restricted websites at your workplace,...

Scientists Discover Matrix-like Technique To ‘Upload Knowledge To Your Brain’

Short Bytes: Scientists have discovered that feeding knowledge directly into the brain could be as easy as going to sleep. This was made possible...

How To Enable/Disable Secure Boot In Windows 8, 8.1, And 10?

Short Bytes: Windows 8 and later versions of Windows come with UEFI Firmware settings which allow a user to disable any external intervention via...