Phishing Technique

Password theft is becoming the most dangerous crime in our cyber society. Many times having no knowledge about cyber security leads people to beome victim of cyber-crime and loses their important money, data and much more. So at this point...

Information system

A system is a set of artifacts that together achieve some outcome. An information system is a system that achieves a business outcome. An information system collects, manipulates stores and reports information regarding the business activates of an...

As people depend on computers for anything and everything they often try to get their tasks done at the earliest ignoring the threats and risks out there in the cyber world. All we do is install an antivirus program on our computer and then we’re...

Gone are the days when cell phones were only used to talk with each other or to play some games like Snake that came by default with the device. Now as we have moved along with time things have changed so rapidly and abruptly that cells have become...

Now-a-days it is quite important to keep your data safe so that you can retrieve it later if required. There are many ways by which you can keep your data safe by external storage devices like pen drives, blank Cd's and DVDs. But today I am going...

Security Protocol

Security Protocol Protocol is a set of rules for communicating one & another PCs in public & private network. There are various types of Security Protocol for specific purposes as communication Protocol, Security Protocol 1 FTP- It...

The dangers of Internet

Internet has become part of our society. It is a useful medium, but danger is often lurking. There are also people who abuse the potential of this global computer network. Chatrooms The time when the Internet was used only for business and most...

Networking terms

Benefits of ISA Enterprise Edition • Supports over 4 CPU and over 2 GB of RAM • Up to 32 nodes with Network load balancing • Unlimited caching arrays with Cache Array Routing Protocol (CARP) • Supports enterprise-wide (array) policies using...

Security Policies

Security Policies • Security policies govern security for the enterprise. • The security policy would detail your firewall rules. For example, this policy would define what traffic is allowed in and out of your network, by who, when, and what...

Malicious Software-Virus

                                   MALICIOUS SOFTWARE What is malicious software? A software that has been intentionally included or inserted in a system , mainly for any harmful purpose. They are mainly of 2 categories:  1. A Host...

Internet and Security

The basic needs of human life are food, clothing and shelter. This is what we have learnt in our school text books. But the present scenario is people can live even without food, but not without a computer with internet connection. This article is...

Recovery of deleted mail

          IIf we are far from our relatives,friends, at that time, use of E-mail comes in handy. Now, the use of E-mail is also taken in kind of sharing useful information. E-mail is used for many purposes. In Companies and offices, to send and...

Cyber Crime

There's a brand-new crime which is happening progressively with the development of the cyberspace. People will exercise the Net for a differentf avenues, all the same, immoderate following now makes up a crime that is penal by jail time...

Network security

                                      Network SecurityWe want to know about the network in order to know about network security. Network is interconnections. Interconnections can be done with devices like cell phones and various other resources....

The Terminator-Virus

Do you have a PC-personal computer at home?(or as some would like to call it, a desktop Pc) Then you should definitely have come across the term 'Virus'.They are the dreaded things that makes us conscious every time we plug in a memory device,...

Facebook has acquired its presence in one of the leading real-time internet search engines across the cyberspace: OneRiot. OneRiot announced recently that it would include the posts that descend from the popular social networking website in its...

In the recent times one of the major cyber crimes is password hacking. We should be very careful with our password not to hack as we will be having lot of personal and professional information in our account. It’s not so difficult to keep the...

  CRYPTOGRAPHY :Cryptography in layman’s terms would mean the study of creating messages in a form of secret code that masks the actual message and displays it as something completely unintelligible.These cryptic messages make absolutely no sense...

Prevent Data Theft via USB drives

Many times other takes your data from your computer without your permission via USB drives.This is a security threat. If you want that no one can copy your data without your permission,You can do so by editing registry values. To prevent access of...

Windows XP has a special feater that allows the user to use computer after forgetting password. It creates a password reset disk to reactivate your user account and reset the forgotten password. CREATE A PASSWORD RESET DISK : To create password...

Powered by CjBlog