<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Shahzaib Haider</title>
    <description>The latest articles on Forem by Shahzaib Haider (@shahzaibhaider).</description>
    <link>https://forem.com/shahzaibhaider</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1989033%2F058fc89b-584f-4479-b67c-53ab89be777f.png</url>
      <title>Forem: Shahzaib Haider</title>
      <link>https://forem.com/shahzaibhaider</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/shahzaibhaider"/>
    <language>en</language>
    <item>
      <title>𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒</title>
      <dc:creator>Shahzaib Haider</dc:creator>
      <pubDate>Sat, 02 Nov 2024 20:58:52 +0000</pubDate>
      <link>https://forem.com/shahzaibhaider/-1469</link>
      <guid>https://forem.com/shahzaibhaider/-1469</guid>
      <description>&lt;p&gt;Data security is a top priority for businesses and individuals alike. With cyber threats evolving, keeping sensitive information secure has never been more critical. But when it comes to securing data, terms like "Encryption" and "Hashing" often come up. Although these techniques are both essential for data protection, they work in very different ways.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Encryption?
&lt;/h2&gt;

&lt;p&gt;Encryption is a process that transforms readable data, known as plaintext, into an unreadable format called ciphertext. This transformation makes data indecipherable to unauthorized users. Only those with the correct "key" can convert ciphertext back into plaintext, restoring the data to its original, readable form.&lt;br&gt;
&lt;strong&gt;Symmetric Encryption:&lt;/strong&gt; a single key used to both encrypt and decrypt data. &lt;br&gt;
&lt;strong&gt;Asymmetric Encryption:&lt;/strong&gt; a pair of keys: one for encryption and another for decryption. &lt;/p&gt;

&lt;h2&gt;
  
  
  What is Hashing?
&lt;/h2&gt;

&lt;p&gt;Unlike encryption, hashing is a one-way process. Hashing transforms data into a fixed-length string of characters, commonly called a hash or hash value. Once data is hashed, it cannot be reverted to its original form, making hashing ideal for verifying data integrity rather than data confidentiality.&lt;/p&gt;

&lt;h2&gt;
  
  
  How Hashing Works
&lt;/h2&gt;

&lt;p&gt;Hashing uses mathematical functions to produce a unique hash value based on the input data. Even a small change in the input creates a drastically different hash, which is essential for detecting alterations in the data. Popular hashing algorithms include MD5, SHA-1, and SHA-256.&lt;/p&gt;

&lt;h2&gt;
  
  
  Common Misconceptions about Encryption and Hashing
&lt;/h2&gt;

&lt;p&gt;To clear up any confusion, let’s address some common myths around encryption and hashing:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Myth: Hashing is a form of encryption.&lt;br&gt;
Truth: Hashing does not conceal data like encryption. It simply generates a fixed representation (hash) of the original data.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Myth: Encryption is always better than hashing.&lt;br&gt;
Truth: Encryption and hashing serve different purposes. Each is valuable depending on the context and security needs.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Myth: A hash can be "decrypted."&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Truth: Hashes are irreversible, meaning you cannot recover the original data from the hash. This is why hashing is often used for password storage.&lt;/p&gt;

&lt;p&gt;That’s it for now, Stay tuned.&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>hashing</category>
    </item>
    <item>
      <title>TCP/IP Model vs OSI Model: A Detailed Comparison</title>
      <dc:creator>Shahzaib Haider</dc:creator>
      <pubDate>Mon, 16 Sep 2024 20:06:00 +0000</pubDate>
      <link>https://forem.com/shahzaibhaider/tcpip-model-vs-osi-model-a-detailed-comparison-1871</link>
      <guid>https://forem.com/shahzaibhaider/tcpip-model-vs-osi-model-a-detailed-comparison-1871</guid>
      <description>&lt;p&gt;In the world of computer networking, understanding the key models that explain how data moves across networks is essential. The two most commonly referenced models are the TCP/IP model and the OSI model. While both serve similar purposes, they approach the task differently. This article will break down the differences, advantages, and shortcomings of each to help you better understand how they work.&lt;/p&gt;

&lt;p&gt;Networking models are crucial for enabling communication between devices, whether they are across the room or across the world. The TCP/IP (Transmission Control Protocol/Internet Protocol) and the OSI (Open Systems Interconnection) models are the most widely recognized frameworks used to standardize how devices communicate over a network.&lt;/p&gt;

&lt;p&gt;But which one is better? Is one more reliable than the other? Let’s dive deeper into each model to compare their structures and functionality.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is the TCP/IP Model?
&lt;/h2&gt;

&lt;p&gt;The TCP/IP model, also known as the Internet Protocol Suite, is the foundation of the internet. It is a set of communication protocols used for connecting network devices on the internet. It was developed by the U.S. Department of Defense in the late 1970s and consists of four layers:&lt;/p&gt;

&lt;h3&gt;
  
  
  Network Access Layer
&lt;/h3&gt;

&lt;p&gt;Deals with hardware addressing and the physical connection to the network.&lt;/p&gt;

&lt;h3&gt;
  
  
  Internet Layer
&lt;/h3&gt;

&lt;p&gt;Routes the data to the destination across multiple networks using IP addressing.&lt;/p&gt;

&lt;h3&gt;
  
  
  Transport Layer
&lt;/h3&gt;

&lt;p&gt;Ensures reliable data transmission between devices (commonly uses TCP or UDP).&lt;/p&gt;

&lt;h3&gt;
  
  
  Application Layer
&lt;/h3&gt;

&lt;p&gt;Provides applications with standardized communication channels (HTTP, FTP, SMTP, etc.).&lt;/p&gt;

&lt;p&gt;The TCP/IP model is practical, built to handle real-world applications and designed to enable the creation of the internet. It is flexible and scalable, making it the backbone of modern networking.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is the OSI Model?
&lt;/h2&gt;

&lt;p&gt;The OSI (Open Systems Interconnection) model is a conceptual framework used to understand and implement standard communication protocols. Developed by the International Organization for Standardization (ISO) in the 1980s, the OSI model has seven layers, each with a distinct function:&lt;/p&gt;

&lt;h3&gt;
  
  
  Physical Layer
&lt;/h3&gt;

&lt;p&gt;Manages the physical transmission of data over a medium (cables, signals, etc.).&lt;/p&gt;

&lt;h3&gt;
  
  
  Data Link Layer
&lt;/h3&gt;

&lt;p&gt;Handles error detection, framing, and managing data flow between devices.&lt;/p&gt;

&lt;h3&gt;
  
  
  Network Layer
&lt;/h3&gt;

&lt;p&gt;Responsible for routing and forwarding data packets across networks.&lt;/p&gt;

&lt;h3&gt;
  
  
  Transport Layer
&lt;/h3&gt;

&lt;p&gt;Ensures complete data transfer with error checking and flow control.&lt;/p&gt;

&lt;h3&gt;
  
  
  Session Layer
&lt;/h3&gt;

&lt;p&gt;Manages sessions between communicating devices, including opening and closing sessions.&lt;/p&gt;

&lt;h3&gt;
  
  
  Presentation Layer
&lt;/h3&gt;

&lt;p&gt;Converts data formats and handles encryption and compression.&lt;/p&gt;

&lt;h3&gt;
  
  
  Application Layer
&lt;/h3&gt;

&lt;p&gt;Provides the interface for end-user services, such as email or file transfer.&lt;/p&gt;

&lt;p&gt;The OSI model is more theoretical than practical, often used as a teaching tool or as a reference model for understanding different networking components.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Differences Between TCP/IP and OSI Models
&lt;/h2&gt;

&lt;p&gt;While both models serve to standardize communication, they differ in structure and approach.&lt;/p&gt;

&lt;h3&gt;
  
  
  Number of Layers
&lt;/h3&gt;

&lt;p&gt;The TCP/IP model has 4 layers, while the OSI model has 7 layers. The OSI model is more detailed, providing a clearer separation of functions between layers. In contrast, the TCP/IP model merges certain functionalities, simplifying the process.&lt;/p&gt;

&lt;h3&gt;
  
  
  Layer Functions
&lt;/h3&gt;

&lt;p&gt;In the TCP/IP model, the Application Layer includes functions from the OSI model’s Application, Presentation, and Session layers. Similarly, the Network Access Layer in TCP/IP handles tasks from both the Data Link and Physical layers in the OSI model.&lt;/p&gt;

&lt;h3&gt;
  
  
  Development and Use
&lt;/h3&gt;

&lt;p&gt;The TCP/IP model was developed alongside the internet and is widely used in the real world. It was designed for practicality and scalability.&lt;br&gt;
The OSI model is more of a universal reference model, often used for theoretical learning or as a guideline for developing new protocols.&lt;/p&gt;

&lt;h3&gt;
  
  
  Reliability
&lt;/h3&gt;

&lt;p&gt;TCP/IP uses the Transmission Control Protocol (TCP), which ensures reliable, ordered delivery of a stream of data between devices. The OSI model, being a conceptual model, doesn't specify protocols, leaving the specifics of reliability up to the implementers of the network.&lt;/p&gt;

&lt;h2&gt;
  
  
  Advantages and Disadvantages
&lt;/h2&gt;

&lt;p&gt;Both models have their strengths and weaknesses. Here’s a quick comparison:&lt;/p&gt;

&lt;h3&gt;
  
  
  TCP/IP Model Advantages:
&lt;/h3&gt;

&lt;p&gt;Simplicity: Fewer layers mean less overhead and quicker setup.&lt;br&gt;
Flexibility: It adapts to a variety of real-world applications.&lt;br&gt;
Scalability: Built for the internet, it can scale globally with minimal modification.&lt;/p&gt;

&lt;h3&gt;
  
  
  TCP/IP Model Disadvantages:
&lt;/h3&gt;

&lt;p&gt;Less Specific: Merging layers can result in less clarity when troubleshooting.&lt;br&gt;
Security Concerns: Does not have a dedicated session or presentation layer to manage encryption and data formatting.&lt;/p&gt;

&lt;h3&gt;
  
  
  OSI Model Advantages:
&lt;/h3&gt;

&lt;p&gt;Clear Layer Separation: The seven layers provide a more structured framework for understanding and designing network protocols.&lt;br&gt;
Standardization: It provides a universal language for discussing and developing new network technologies.&lt;/p&gt;

&lt;h3&gt;
  
  
  OSI Model Disadvantages:
&lt;/h3&gt;

&lt;p&gt;Theoretical Nature: The OSI model is not commonly used in real-world applications, which limits its practical impact.&lt;br&gt;
Complexity: Seven layers can make troubleshooting or learning more challenging, particularly when compared to TCP/IP.&lt;/p&gt;

&lt;h2&gt;
  
  
  Which Model Should You Use?
&lt;/h2&gt;

&lt;p&gt;For most modern applications, the TCP/IP model is the better choice. It is the de facto standard for networking today and supports the majority of internet-based systems. Its simplicity and efficiency make it ideal for both small-scale networks and large global networks.&lt;/p&gt;

&lt;p&gt;The OSI model, on the other hand, is valuable for understanding networking concepts. It’s often used in education and theoretical discussions about network architecture, but it is not typically implemented in real-world systems.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;In summary, the TCP/IP model and the OSI model serve similar purposes but from different perspectives. The TCP/IP model is practical and widely used, whereas the OSI model offers a more granular, theoretical approach. Understanding both models will give you a solid foundation in networking, helping you troubleshoot issues, design systems, or dive deeper into network security.&lt;/p&gt;

&lt;p&gt;If you're setting up or managing a network today, TCP/IP is the model you'll most likely be working with. But don’t discount the OSI model—it’s an invaluable tool for learning and understanding the complexities of networking.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>networking</category>
      <category>devops</category>
      <category>linux</category>
    </item>
  </channel>
</rss>
