Blog

30 Articles
ICTKB_IMG

Blockchain Technology

Blockchain is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. An asset can be tangible (a house, car, cash, land) or intangible (intellectual property, patents, copyrights,...

ICTKB_IMG

Computer Processor 32 Bit vs. 64 Bit

When it comes to computers, the difference between 32-bit and a 64-bit is all about processing power. Computers with 32-bit processors are older, slower, and less secure, while a 64-bit processor is newer, faster, and more secure. But what do the...

ICTKB_IMG

What is Botnet Attack

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker. A botnet (short for robot network) is a network of computers infected by malware that are under the control of a single attacking...

ICTKB_IMG

Set up multiple monitors on Windows

Getting another monitor can help you stay productive and organized. If you’re the type of person that opens lots of programs at once, cramming all of them in one monitor can quickly clutter up your screen. With two monitors, you can surf the web...

ICTKB_IMG

Dark Web, Deep Web and Surface Web

If we imagine web as an ocean, the surface web is the top of the ocean which appears to spread for miles around, and which can be seen easily or “accessible”; the deep web is the deeper part of the ocean beneath the surface; the dark web is the...

ICTKB_IMG

Zero Trust Security Model (ZTNA)

Zero Trust security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter....

ICTKB_IMG

Tips for Troubleshooting Microsoft Outlook

Microsoft Outlook is the most popular business software program in the world, and its top ranking is well deserved. It manages so much of our business and personal life in one big window. Because we rely on it for our e-mail communications, meeting...

ICTKB_IMG

Let’s understand DMZ – Demilitarized Zone

A DMZ  or demilitarized zone is a perimeter network that protects and adds an extra layer of security to an organization’s internal local-area network from untrusted traffic. The purpose of a DMZ is to add an additional layer of security to...

ICTKB_IMG

Delete Windows.old folder on Windows

When you upgrade your computer to a new version of Windows 10, or you install a preview build, the installation process saves a copy of the previous version in the “Windows.old” folder. This is part of the safety mechanism in case the upgrade...

ICTKB_IMG

Firewall types (Network based Vs Host based)

Nowadays protecting IT assets is most important and critical part for anyone. A “Firewall” is one of the most popular computer and network security devices that professionals use to protect their enterprise IT assets and networks. Just like a...

Our site uses cookies. By using this site, you agree to the Privacy Policy and Terms of Use.