What is Object Oriented Programming? Object-oriented programming is a form of programming that is more in tune with how we view things in other aspects of our lives. Rather than using functions or specific logic to create code, it centers software design around "objects" or data. It has been easier to wrap my head around because I can relate certain aspects of it to parts of my everyday life. In today's post, I'll go over a few of the core concepts of object-oriented programming, and you'll have a better understanding of what I'm getting at by the end. What are the core concepts of object-oriented programming? In object-oriented programming, there are four core concepts. These concepts include encapsulation, inheritance, polymorphism, and abstraction. Encapsulation: Encapsulation is the idea of bundling attributes and functions that operate on data into units called classes. There are different types of classes, but we won't dive too far into that here...
Hey there! Loons here! Today, I want to share my experience with ping and traceroute commands! Anyone can do this. It is a fun activity, provided they have a PC to do so! Its simplicity makes it fun, especially since you can plug in any website. I sat down with my nine-year-old and had him pick any site he could think of, and we had fun watching the traceroute do its thing. This knowledge helped both of us learn and grow. This experience has been excellent and is a great way to illustrate the difference between ping and traceroute and what they can accomplish. Let's get into it! When it comes to ping and traceroute, I like to think of it as sending a letter. With ping, you can see the interaction between two different parties or hosts. So, with ping, you can tell how long it's taking for your information to travel between parties. This would be like counting the days it takes for your letter to get from you to its destination or vice versa. Traceroute, on the other hand, is ...
Hey there! Loons here! Today's post is a longer one, so we're going to dive right in. We'll be talking about network security and the different ways nefarious entities try to keep the upper hand. In today’s world, with our reliance on computers at an all-time high, it is no wonder that criminals and nefarious entities have turned to attacks on computer systems to get what they seek. This can come in the form of direct attacks on individuals to steal sensitive information or larger-scale attacks on businesses or networks meant to do as much financial damage as possible. Sometimes, this is for financial gain or perhaps to convince a company or individual to do or not do something. This paper will give some details on a few types of attacks, what symptoms will help you know you are being attacked, and what options we have to attempt to prevent these types of attacks. The first example we will review here is the DoS attacks or denial of service attacks. These attacks can be e...
Comments
Post a Comment