Articles [PC & Internet Security]

      Image Source: babble   Majority of us have started using Internet not just for searching information, but to pay bills, buy things, money transfer, work from home and much more. Many hackers take advantage of this and are trying various...

Cryptography Cryptograthy is used for security. Simply Cryptography is converting the understanable text to not understanable text. Encryption means converting plaintext into cipher text. Decryption means converting cipher text into plain...

How should a person start hacking?? That means what should be the first step of him in the world of hacking?? Hacking is not a thing which someone can learn from others. But, ya at first he should see how hackers work, and also have a look on the...

    What is a Virus? A virus is a program that is able to replicate, that is create (possibly modified) copies of itself. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach...

There some tricks with the use of which you can apply security and also will get some knowledge   1.) To see internal & external IP : a. Internal IPmethod 1st steps : a. My N/W Places [ right click ] b. properties c. Lan [ right click ] -->...

  MOBILE POWER CONSERVATION   INTRODUCTION:   · In today’s world of mobile communications, one of the most precious commodities is power. The mobile can only operate as long as its battery maintains power. · Most software-level techniques...

  AVG 9.0 antivirus software is going to hit the markets this month. The improvements in the upcoming version can be seen in the speed and the levels of protection offered by it. The best of the free anti-malware products, AVG 9.0 will being to...

Password cracking is the process of recovering password from data that has been stored in or transmitted by a COMPUTER SYSTEM. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user...

Now day’s internet hackers are using Internet cafes mainly so that it will be tougher to trace them. Most of us, who even have internet connection at home, uses internet cafes often, when it urgent and when we are away. But we must be careful while...

While browsing internet or more specificaly while opening internet sites all of you must have seen in the url's(uniform resource locator) say for eg.http://www.google.comis the url of google server.the url of a web server is same as we have home...

Powered by CjBlog