How to block unwanted websites

How to block unwanted websites   You can try using something like parental control software like: cyber patrol parental control, Parental control bar, Safe Families We-Blocker Parental Control. if you are browser specific and using internet...

What is Digital signature ?

IntroductionA digital signature serves many purposes. It doesn't just validate data, but is truly a fingerprint from the sender. The digital signature depends on the key pair, the data of the message, and a signature. All these elements are mapped...

A study about Data Integrity

Ensuring data integrity is a very important part of computer science, from the Web page to software that is being ordered off the Web. If files are not periodically checked, then viruses and Trojans can be inserted into the data without the...

TCP and System Security

The network services that bind to TCP ports provide direct access to the host system. If the service provides access to the hard drive, then any remote user has the potential to access the hard drive. Whereas network protocols such as IP and IPv6...

The old adage "Information is power" is more true than ever for the corporate world. Even the release of very general information about a company (for example, an upcoming merger between company A and company B) can have a profound impact on a...

There are four basic principles that apply for most security systems: authentication, authorization, confidentiality, and integrity. Authentication (proving identity with credentials) – Authentication is the process of proving the identity of a...

Security in the Digital World

The physical world and the digital world have many similarities when it comes to security processes. The need for authentication, authorization, confidentiality, and integrity do not change from the physical world to the digital one. They do,...

Securing Enterprise Resources

    In this article the Common Criteria (CC), an effort by the international community to define a standard set of evaluation criteria for IT security, and then it presents a starting point for you to explore and gather your application's...



Secure Socket Layer


Wireless Networks

  Wireless networks are widely found within residential and small office areas. Compared to wired networks, wireless networks are easier to install and less expensive than running wires through walls; however, wireless networks are not ideal in...


OSI Model Layer : Physical Layer


Ethics is need of IT security


Paypal problems

Many people who buy and sell online, who do online work like article writing, building websites etc use paypal account for the transfer of payments. There are various sites like paypal, alertpay, moneybookers etc through which online transfer and...

A management student from lucknow age 23 found a loop hole in microsofts latest release WINDOWS 7.The letter has been written to microsoft india but not paid a heed upon.but it created a havoc when the news was out. The loop hole is goes in terms...


Elliptic Curve Cryptography


Protection From Hackers


Network Attacks


Powered by CjBlog

Do you love satya sai baba

i love baba...and want to many of you like baba
No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 2 answer(s).
[{"id":"20770","title":"Yes","votes":"71","type":"x","order":"0","pct":63.96,"resources":[]},{"id":"20771","title":"No","votes":"40","type":"x","order":"0","pct":36.04,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
bottom 200
De-graft Afful Jr.
I surely remember the day I fell from the sky, my spine broke and most of all, my heart was broken to pieces of glass   You told me you were going to
It is a action packed gaming phone. It has 2.4", 262K TFT Screen display. It has preloaded Opera mini software. This mobile has J2ME and MIDP 2.0 support.
Santosh Kumar Singh
Why do we feel unhappy, sometimes, because of circumstances, which affect us? The fact, that the circumstances make us unhappy, is in the fact, the biggest
Raaghavan Krishnamurthy
The Olympic Games begun at Olympia in Greece in 776 BC. The Greek calendar was based on the Olympiad, the four-year period between games. The games were
To be a happy couple  The world is changing too fast beyond our expectation and we are facing too many misunderstanding in between married couples,