Articles [PC & Internet Security]

The basic needs of human life are food, clothing and shelter. This is what we have learnt in our school text books. But the present scenario is people can live even without food, but not without a computer with internet connection. This article is...

          IIf we are far from our relatives,friends, at that time, use of E-mail comes in handy. Now, the use of E-mail is also taken in kind of sharing useful information. E-mail is used for many purposes. In Companies and offices, to send and...

There's a brand-new crime which is happening progressively with the development of the cyberspace. People will exercise the Net for a differentf avenues, all the same, immoderate following now makes up a crime that is penal by jail time...

                                      Network SecurityWe want to know about the network in order to know about network security. Network is interconnections. Interconnections can be done with devices like cell phones and various other resources....

Do you have a PC-personal computer at home?(or as some would like to call it, a desktop Pc) Then you should definitely have come across the term 'Virus'.They are the dreaded things that makes us conscious every time we plug in a memory device,...

Facebook has acquired its presence in one of the leading real-time internet search engines across the cyberspace: OneRiot. OneRiot announced recently that it would include the posts that descend from the popular social networking website in its...

In the recent times one of the major cyber crimes is password hacking. We should be very careful with our password not to hack as we will be having lot of personal and professional information in our account. It’s not so difficult to keep the...

  CRYPTOGRAPHY :Cryptography in layman’s terms would mean the study of creating messages in a form of secret code that masks the actual message and displays it as something completely unintelligible.These cryptic messages make absolutely no sense...

Many times other takes your data from your computer without your permission via USB drives.This is a security threat. If you want that no one can copy your data without your permission,You can do so by editing registry values. To prevent access of...

Windows XP has a special feater that allows the user to use computer after forgetting password. It creates a password reset disk to reactivate your user account and reset the forgotten password. CREATE A PASSWORD RESET DISK : To create password...

Powered by CjBlog