A DNS record used to route a domain to an IP address.
An authorization restriction mechanism that identifies users and groups about access permissions assigned to or rejected on an object.
Alternatively, a base station and an access point, called a wireless router, is a wireless receiver that allows the user to wirelessly connect to a network or Internet.
If the device to be connected to the switch port is a normal network user, such as a computer / network printer, the port is defined as Untag.
An Access Server is a networked computer that is set up and responsible for granting rights to other computers that are not members of its network.
The process by which a connection is established through a protocol, the computer or device; is the confirmation message that the communication is completed.
The term active topology describes a network topology in which the signal is amplified at each step as it passes from one computer to another.
SQL Injection, Blind SQL Injection, Cross Site Scripting, CRLF Injection, Code execution, Directory Traversal, File Inclusion and Authentication bypass, such as a tool to find many types of web vulnerability reporting process.
The ARP protocol is used to find the MAC address of a known device on the network.
Software that automatically displays ads on your computer. When you use an application, ads will appear automatically on your computer.
It is a symmetric encryption algorithm that uses 128 to 256 bit key dimensions.
Any interruption in the organization reaches a critical level and when there is no solution to eliminate the interruption, this is the case.
Allows the user to hide web activity.
Wi-Fi is a wireless network that uses one of the IEEE 802.11 wireless standards to provide a wireless connection to a network.
Commonly used for detecting or eliminating many malware threats, including computer viruses, worms, trojans, malicious browser add-ons, adware and spyware.
Apple Talk is used to communicate between clients and server computers.
The application layer is programs that will use the network connection. For example: HTTP, FTP, SSH…
It is a tool that allows the user to search the name of a particular file on all anonymous FTP servers registered to the user.
It is a 7-bit character set based on the Latin alphabet.
Asymmetric Digital Abbreviation for Subscriber Line. It is the most used connection technique for internet connection. It is a modem technology that can provide more data on audio and video communication at the same time through standard copper telephone wires.
It is the ADSL standard that allows clients to reach higher data rates and connect to more remote clients.
ATM is a network technology that enables the transmission of different types of data, such as audio, picture, video, into fixed data packets.
In order to perform certain operations, it means that the previously defined information is verified and the user introduces himself to the system.
A fixed line that is referenced to measure length or to determine locations.
The first octet in the IP address is between 0 and 127, and the default subnet mask is 255.0.0.0. In other words, the first octet shows the network ID and the other three octets indicate the host ID.
The ARP protocol is used to find the MAC address of a known device on the network.
ePati Cyber Security Co.
Mersin Üniversitesi Çiftlikköy Kampüsü
Teknopark İdari Binası Kat:4 No: 411
Posta Kodu: 33343
Yenişehir / Mersin / TURKEY
Web: www.epati.com.tr
e-Mail: info@epati.com.tr
Tel: +90 324 361 02 33
Fax: +90 324 361 02 39