Skip to content

Sharif's Page

Tag: #cs352

Network Security

The internet has taken over the world, but with it have come malicious actors. People want to spy on you, scam you, steal from you, or harm you through the internet. Through network security, we can shield potential victims from at least some of these harms.

The Link Layer

Through all the layers of the internet, the most essential is the link layer: converting bits to and from signals, detecting errors, flow control, and addressing.

HTTP Explained

HTTP is probably the most visible Internet protocol to end users. It appears (as well as its cousin, HTTPS) at the beginning of every URL we use to access the internet. But how does it work?

SMTP Explained

Email is the most popular way in the world to send large messages. This is a complicated process which requires its own protocol: SMTP.