Internet A Growing Need of our Nation, Internet is best option to learn, enjoy, and even earn from it. Internet help students in their studies, a mother in learning cooking, a kid to play games, a man to do official work. In today's arena it is...

Introduction:  The very word, “cyber crime” has several distinctive connotations for system administrators who deal with a sense of sophistication and modernity of integrated systems, which pose umpteenth threats to enterprises which often...

Information about ethical hacking

Ethical hacking and its opportunities Ethical hacking means hacking a system or a website for to understand the security weakness in order to make the system or server safe and secure. Ethical hackers are good hackers they are known as ‘white...

Ways to avoid getting life hacked

How to stay secure? We hangout with laptops and smart phones on a daily basis. Every right implies a responsibility. Every opportunity is a possession of an obligation to the form of obligation. One is in charge of the security of one’s own...

What is cyber crime?

How is cyber crime actually defined?: A notorious hacker is seating in somewhere at the outskirts of Russia or China with a laptop in his couch. He is generating spam messages or cyber bullying in coordination among different experts all around...

Online shopping Many of us have started shopping online these days as we find very little time to go to different markets and this is especially true for people living in metros or big cities. Most people in different jobs find it tough to go for...

As the technology has advanced, so has the threat to the security of our systems. We are installing more powerful and authenticated anti-viruses these days, but the threat to damage our system does not seem to be halting.  As more and stronger...

Trojan-a threat to computer

Computer and virus. Now Internet is being a common option to know many unknown things and to communicate with our relatives who stay in distance through many social communication site. Multinational companies use the net for teleconferencing and...

Digital security systems are high-technology equipment combination installed for detection of attackers or potential intruders in our homes or any other types of establishments. These systems mostly consist of video surveillance cameras and digital...

COMPUTER SECURITY Hi friends, today I'm going to write about some security measures that you need to take while using your computer. If you don't take it seriously now you may be in danger in the future. You may be having your personal details or...

  Spyware is malicious software that installs itself in the user’s computer without the knowledge of the user and sends personal information to the creator of the spyware. The creator can be the owner of a website who would use your personal...

Basic Concepts of Networking

  What is Networking? In simple word, networking can mean a chain or loop formed to connect or share. However, technologically, networking refers to the collection of hardware devices connected via hardware/software for the purpose of sharing and...

External security and cryptography

A resource should be protected in both ways - externally and internally. Internal harms include unauthorized access, transfer of data and changing or destroying some important piece of information. Stress is mostly given to internal security of...

Computer Security

  Computer security in a matter of concern for all of us. If we are not alert we may be attacked by malicious hackers, trojans, worms, rootkits, keyloggers, malware, etc. These threats may affect our computer through internet, CDs, pen drives and...

                                       For most of the browsers this is a very frustating situation when your web browser redirects you to a different page which in no way relates to what you have searched for.Of lately, google redirect viruses...

Making of Holograms

  Everytime, we see Holograms on various products for identification purpose. Holograms are fascinating as they change with light. Lets study how these are made. Holograms are simply layered variations of an image. Each variation reflects...

Cryptography

Cryptography is a technique by which we can safely send our data from one place to another or we can say from sender to receiver computer. Or we can say it is an art of writing the data into secret codes so that it cannot be understand by any...

Computer Virus

In today’s technological arena, the most common botheration that we all face with our PCs, Laptops or Workstations is VIRUS. The problem is so vast and deep rooted that it becomes obvious for all to install effective antivirus software in our PC...

Security Threats There is lot of malicious activities online which is the main reason for security threats in recent time and has become a major concern for PC users, businesses, software manufacturers. In the year 2010 and so far, there is...

Introduction to Spyware It is estimated by Source: Facetime communications, that 80% and more than that of personal computers have the problem of spyware infected on its operating system. But what exactly is this spyware and how is it different...

Powered by CjBlog