Systems that contain computers and applications that are key to monitoring and controlling critical services.
It is the standard that controls devices such as Hard Drive, CD drive, scanner, printer, in a more compatible and advanced way than parallel interface standards.
A cryptographic network protocol that is used to secure network services over an unsecured network. SSH provides a secure channel on an unsecured network within the client-server architecture framework by connecting an SSH client to an SSH server.
It is used to securely access any network from a distance. SSL encrypted encrypted communication is provided through SSL VPN. IPSec VPN has been replaced by SSL VPN because of the difficulties experienced in IPSec VPN.
They provide real-time analysis of security alerts generated by applications and network hardware.
The session layer is the layer in which the connection is established, used and terminated between the computers that will communicate. For example: SQL, NFS, Netbios
SMTP is an e-mail sending protocol that determines the way in which the server communicates with the client to send e-mails.
In particular, FastEthernet Switch and Hubs are bundle or optional. Thanks to this feature, the management of the Hub or Switch can be made remotely, allowing logging about the status of the ports, allowing you to discover and solve any problems in your network.
It is the process of capturing the data packets on the network and reading the contents.
The software is presented as a service. In this model, the software is hosted on the service provider’s servers.
The STP is an IEEE 802.1 standard, and it uses some of the bridging devices, including the switcher, to block some ports to remain only one active connection between any LAN segment (collision domain) using a software-based spanning-tree algorithm. It also prevents cycles that may occur when there are multiple active routes between stops.
Malicious software that transfers data on a computer to a different person or persons without the consent of a computer user. Spyware viruses are mostly used for advertising purposes and stored in a downloaded software and the user is not aware of it.
Taking advantage of Web application vulnerabilities, it is an attack type that allows SQL queries and commands to be run on the server where the related web application is hosted.
The star topology is the result of a direct connection of each terminal (servers, workstations and other peripherals) to the central connectors called switches or hubs. The data passes through the switch or hub to go to the destination address.
Learning the computer MAC addresses with ARP requests can create a security weakness. The manual processing of MAC Addresses and IP Address equivalents to the computer is called Static ARP.
It is a one-to-one dial-up to the public IP that will be used outside the private (virtual) IP used in the local network. It synchronizes all ports of the local IP exactly to the actual IP.
Router is the system administrator defined fixed routing rules. Static Routing is done if there is only one way to reach the target networks.
It is used to divide subnets into class A, B and C IP addresses. That is, the process of allocating the IP address to smaller address groups.
It is the module that controls the device on chassis-based switches and makes the L3 guidance.
It does the same with hubs. The switch looks at the address of the incoming data, establishes a virtual connection between the sender and the recipient of the data, without the awareness of other computers. Provides a dedicated path.
epati Information Technologies LLC.
Mersin Üniversitesi Çiftlikköy Kampüsü
Teknopark İdari Binası Kat:4 No: 411
Posta Kodu: 33343
Yenişehir / Mersin / TURKEY
Tel: +90 324 361 02 33
Fax: +90 324 361 02 39