@.ayo35: تريدون شرح🫣❤️‍🔥#م #شروحات #تصميمي #تصاميم

10
10
Open In TikTok:
Region: IQ
Saturday 08 June 2024 20:46:35 GMT
580137
49238
365
2322

Music

Download

Comments

w_h5w
روِروِ 🩵🪐 :
@M✨🤍
2024-06-20 08:39:01
1
1_vmo
M :
معكم شخص يرد بالثواني
2024-06-20 03:06:27
36
sinceh1
☜👻مـشـگلجيـﮯهہ👻☞ :
اني حلوه ☺️
2024-06-16 19:18:31
35
js_w39
𝒁𝑨𝑰𝑫³⁹ :
شنو اسم القصيدة
2024-06-17 22:41:50
8
..jasim_78
جاسم :
اعرف اسويه بس الصور ما ادري منين 😭
2024-06-20 19:43:49
6
313_hb_23
بــٍنـًـيـَـטּَ³¹³ :
شلون اسوي هيج اضاءة بــ النص اذا جان النص جاهز يعني كرومه واسوي عليها اضاءة؟!
2024-06-20 19:52:03
10
lalo_edit
🤠M :
اي اشرحلي
2024-06-08 21:19:12
5
rof_.x
اهـمال 🤍 :
سويت مثله شوفوه ✨☺️
2024-06-17 12:58:25
5
shre_fatm
BOLOT . :
شباب متابعه 💀
2024-06-15 08:14:14
11
.cfvn
- عبـدالله| بأنتضار القائم³¹³. :
اشخاص قد تعرفهم؟
2024-06-18 16:59:12
6
___jk__1996
ف͒ہٰٰآطۨہٰٰمـة ⚡ :
راح اخذه ابريني الذمه
2024-06-18 08:40:15
5
jojokaj4
𝐉 :
اخدت فيديو راح انشره بل أستوري بل فيس ✨✨❤️
2024-06-12 14:25:27
6
icts.2003
313 :
كلش حلوه بس لو مخلي القصيده كامله
2024-06-10 10:27:27
17
tb_lk
💕 :
اعشق هذي القصيده 😥
2024-06-17 16:23:53
6
a_1_8b
عباس المرسومي :
نشرته بس ماصعد❤️
2024-06-16 18:53:08
6
marjan_rf4
- مَــࢪجـان 𐤀. :
القصيده النمبر ون عندي حافظته حرف حرف اعشقهاا😭💗..
2024-06-20 03:18:14
6
user7551875161298
Sandra. :
اي والله نزل الشرح فدوه 🥺💔
2024-06-20 10:14:42
4
1_bwm4
👑ابن سوريا 🇸🇾♦️❤️✌️👑 :
عادي اخذو الفيديو ولا لا
2024-06-14 12:21:11
2
saif_ali_3000
سـيـف / X 🔥 :
ممكن الكرومه
2024-06-22 19:52:58
4
yager_kerman_513
Ackerman :
ممكن شرح للتصميم + استمر مبدع🌹
2024-06-23 07:19:05
0
i_8no.1
𝑵🇮🇶. :
ممكن شرححححححححححححح بليزززز
2024-06-21 07:47:16
2
user1770721735404
عماد غانم :
اي نريد
2024-06-21 08:35:39
1
a_ljk64
بــۅدي 🗽. :
ممكن شرح 💖
2024-06-19 18:34:39
2
fnd4x
Murtaza :
ممكن أسم الكرومه
2024-06-18 20:50:47
2
To see more videos from user @.ayo35, please go to the Tikwm homepage.

Other Videos

- Lesson one  Network Security         Fundamentals of Network Security Hello there, today we will talk about a very important topic, Network Security. Imagine networks as highways connecting cities, where these cities represent computers and servers in the digital world. Network security is the system that keeps these highways safe and protected from thieves and intruders. Let's go through the fundamentals together. ˣᵗᵃʷᵇ$$ 1. Basic Concepts of Network Security: $--$ Confidentiality Confidentiality ensures that information is accessible only to those authorized to access it. Think of encryption as a secret language that only someone with the correct key can understand. $--$ Integrity Integrity ensures that data remains unaltered and untampered during transmission or storage. Imagine we have a digital document; using digital signatures is like having a seal of assurance that the document hasn't been changed. $--$ Availability Availability means that systems and networks are accessible when needed. It's like having a library you need to visit at certain times; network security ensures the library is open and ready to serve you at the right time. ˣᵗᵃʷᵇ$$ 2. Core Elements of Network Security: $--$ Firewalls Firewalls are like gatekeepers of a city. They decide who can enter and leave based on a set of security rules. If there is suspicious traffic, the gatekeeper blocks it. $--$ Intrusion Detection Systems (IDS) IDS work like detectives looking for any unusual or suspicious activity in the network. They are always on the lookout for potential threats. $--$ Intrusion Prevention Systems (IPS) These systems not only detect problems but also prevent them immediately. Imagine we have armed detectives; if they detect something suspicious, they take immediate action to stop the threat. $--$ Encryption Encryption is like sending a message in a secret language that only someone who knows the code can read. Protocols like SSL/TLS are used to secure communications over the internet, making it difficult for attackers to understand the data. $--$ Access Control Access control is like having electronic gates that require special cards to enter. By using authentication and authorization, we ensure that only the right people can access sensitive information. ˣᵗᵃʷᵇ$$ 3. Types of Network Attacks: $--$ Denial of Service (DoS) Attacks These attacks are like flooding the library with fake visitors to prevent real users from getting in. The goal is to make the system unavailable to legitimate users. $--$ Man-in-the-Middle (MitM) Attacks Imagine someone sitting between the sender and receiver, eavesdropping, and tampering with the messages exchanged between them without their knowledge. This is what happens in MitM attacks. $--$ Malware Attacks Like viruses that infect the human body, digital viruses aim to harm the network or steal information. ˣᵗᵃʷᵇ$$ 4. Best Practices in Network Security: $--$ Regular Software and Hardware Updates Just as we update our phones to fix vulnerabilities, software and hardware need regular updates to stay protected against new threats. $--$ Using Strong Passwords and Multi-Factor Authentication (MFA) Using complex passwords and MFA, such as adding a temporary code to the password, makes it harder for attackers to breach accounts. $--$ Security Awareness and Training Imagine training all library staff on how to handle emergencies; this helps everyone be prepared to face threats. $--$ Regular Data Backups Like keeping backup copies of important documents, regular backups of digital data ensure we can restore information if an attack occurs. With this, we have covered the essential fundamentals of network security. Remember, maintaining network security is an ongoing process that requires awareness, regular updates, and cooperation from everyone. Thank you for listening, and I hope you found this explanation helpful. الشرح باللغة العربية في قناه التليــ.ــجرام لعدم وجود مساحه كافيه للشرح. #xtawb #Networking
- Lesson one  Network Security         Fundamentals of Network Security Hello there, today we will talk about a very important topic, Network Security. Imagine networks as highways connecting cities, where these cities represent computers and servers in the digital world. Network security is the system that keeps these highways safe and protected from thieves and intruders. Let's go through the fundamentals together. ˣᵗᵃʷᵇ$$ 1. Basic Concepts of Network Security: $--$ Confidentiality Confidentiality ensures that information is accessible only to those authorized to access it. Think of encryption as a secret language that only someone with the correct key can understand. $--$ Integrity Integrity ensures that data remains unaltered and untampered during transmission or storage. Imagine we have a digital document; using digital signatures is like having a seal of assurance that the document hasn't been changed. $--$ Availability Availability means that systems and networks are accessible when needed. It's like having a library you need to visit at certain times; network security ensures the library is open and ready to serve you at the right time. ˣᵗᵃʷᵇ$$ 2. Core Elements of Network Security: $--$ Firewalls Firewalls are like gatekeepers of a city. They decide who can enter and leave based on a set of security rules. If there is suspicious traffic, the gatekeeper blocks it. $--$ Intrusion Detection Systems (IDS) IDS work like detectives looking for any unusual or suspicious activity in the network. They are always on the lookout for potential threats. $--$ Intrusion Prevention Systems (IPS) These systems not only detect problems but also prevent them immediately. Imagine we have armed detectives; if they detect something suspicious, they take immediate action to stop the threat. $--$ Encryption Encryption is like sending a message in a secret language that only someone who knows the code can read. Protocols like SSL/TLS are used to secure communications over the internet, making it difficult for attackers to understand the data. $--$ Access Control Access control is like having electronic gates that require special cards to enter. By using authentication and authorization, we ensure that only the right people can access sensitive information. ˣᵗᵃʷᵇ$$ 3. Types of Network Attacks: $--$ Denial of Service (DoS) Attacks These attacks are like flooding the library with fake visitors to prevent real users from getting in. The goal is to make the system unavailable to legitimate users. $--$ Man-in-the-Middle (MitM) Attacks Imagine someone sitting between the sender and receiver, eavesdropping, and tampering with the messages exchanged between them without their knowledge. This is what happens in MitM attacks. $--$ Malware Attacks Like viruses that infect the human body, digital viruses aim to harm the network or steal information. ˣᵗᵃʷᵇ$$ 4. Best Practices in Network Security: $--$ Regular Software and Hardware Updates Just as we update our phones to fix vulnerabilities, software and hardware need regular updates to stay protected against new threats. $--$ Using Strong Passwords and Multi-Factor Authentication (MFA) Using complex passwords and MFA, such as adding a temporary code to the password, makes it harder for attackers to breach accounts. $--$ Security Awareness and Training Imagine training all library staff on how to handle emergencies; this helps everyone be prepared to face threats. $--$ Regular Data Backups Like keeping backup copies of important documents, regular backups of digital data ensure we can restore information if an attack occurs. With this, we have covered the essential fundamentals of network security. Remember, maintaining network security is an ongoing process that requires awareness, regular updates, and cooperation from everyone. Thank you for listening, and I hope you found this explanation helpful. الشرح باللغة العربية في قناه التليــ.ــجرام لعدم وجود مساحه كافيه للشرح. #xtawb #Networking

About