Skip to content

Commit

Permalink
Updated Networking
Browse files Browse the repository at this point in the history
  • Loading branch information
itspatkar committed Dec 2, 2024
1 parent 54d1809 commit 8119d6a
Showing 1 changed file with 17 additions and 0 deletions.
17 changes: 17 additions & 0 deletions network.html
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,7 @@ <h3 class="title">Networking</h3>
<li><a href="#vpn">VPN</a></li>
<li><a href="#proxy">Proxy</a></li>
<li><a href="#firewall">Firewall</a></li>
<li><a href="#tor">TOR</a></li>
<li><a href="#network-node">Networking Nodes</a></li>
</ul>
</div>
Expand Down Expand Up @@ -212,6 +213,10 @@ <h6>Secure Shell Protocol (SSH) :</h6>
<h6>Dynamic Host Configuration Protocol (DHCP) :</h6>
<p>It is a network management protocol used to automatically assign IP addresses and other network configuration information to devices on a network. DHCP eliminates the need for manual configuration of network settings.</p>
</li>
<li>
<h6>Network Time Protocol (NTP) :</h6>
<p>NTP is a protocol used to synchronize the clocks of computers and other devices over a network. It ensures that systems maintain accurate time by synchronizing with a reference time source, typically an atomic clock or GPS time.</p>
</li>
</ul>

<h6>Default Port for Protocols :</h6>
Expand Down Expand Up @@ -568,6 +573,18 @@ <h4 class="heading"># Firewall</h4>
</div>
</div>

<div class="sections" id="tor">
<h4 class="heading"># TOR</h4>
<div class="content">
<p>TOR stands for The Onion Router, a free, open-source software that enables anonymous communication over the internet. It is designed to protect users' privacy and security by routing internet traffic through a series of volunteer-operated servers, known as nodes or relays, that encrypt and re-encrypt the data multiple times, making it very difficult to trace back to the original user.</p>
<ul>
<li>Onion routing is the technology behind the TOR (The Onion Router) network, and it is designed to provide anonymous communication over the internet.</li>
<li>It works by encrypting data in multiple layers, similar to the layers of an onion, and then routing it through a network of servers (nodes) to ensure that the origin, destination, and contents of the communication are hidden from potential eavesdroppers.</li>
<li>This process helps to obscure users' IP addresses, making it difficult for anyone to track their online activities or locate them.</li>
</ul>
</div>
</div>

<div class="sections" id="network-node">
<h4 class="heading"># Networking Nodes</h4>
<div class="content">
Expand Down

0 comments on commit 8119d6a

Please sign in to comment.