Short Articles

The shortest articles on the hottest topics

Archive : Information Technology

RSS feed

Latest MS Excel Specifications, Features and Benefits
Latest MS Excel Specifications, Features and Benefits

Since its arrival in March 2017, the new updated version of Windows Excel has grabbed good words of mouth from the global users. It is not new that Microsoft always tries to surprise its users by adding...

Exploring ERP Modules of Oracle E-Business Suite
Exploring ERP Modules of Oracle E-Business Suite

The acronym ERP stands for enterprise resource planning. It refers to the systems and software packages used by organizations to manage day-to-day business. Oracle E-Business Suite is one of the most reputed...

Caution! Subtitled Files Can Hack The Devices When You Watch Movies
Caution! Subtitled Files Can Hack The Devices When You Watch Movies

Subtitled files are allowing hackers to read your information.  These files are targeted for malicious software attacks that are being used to control devices like (Smart TV, Computer and Mobile Device)....

Why Microsoft dropped MS OneNote, MS Lync, MS Access and MS Publisher?
Why Microsoft dropped MS OneNote, MS Lync, MS Access and MS Publisher?

Microsoft Office 2016 with its updated version is now offering new features, fixed bugs and improved performances of its applications. With its increased features, MS office has also dropped some of the...

Samba Installation Vulnerable for Remote Attacks
Samba Installation Vulnerable for Remote Attacks

Samba software package is generally for UNIX/Linux systems which are used for sharing files, and printers using SMB and CIFS protocols services. Samba allows Linux/Unix users to set up shared folders and...

MS Power Point 2016 Specifications and Latest Features and Benefits
MS Power Point 2016 Specifications and Latest Features and Benefits

MS Office added new updates in March 2017 as its new version 1703 to all existing product apps including MS PowerPoint as well. There are a lot of new specifications added in terms of faster operation,...

How to Secure MongoDB on Ubuntu 16.04
How to Secure MongoDB on Ubuntu 16.04

In this article, we will learn how to secure Mongo DB on Ubuntu 16.04. In previous versions the Mongo DB is vulnerable to automated exploits because, by default, there  is no authentication which was...

How to Automatically Generate Random Secure Passwords in Google Chrome?
How to Automatically Generate Random Secure Passwords in Google Chrome?

Google Chrome is one of the biggest and widely used web browser platforms. If you use the Internet, it’s almost certain that you use Google Chrome as your primary web browser. As the most popular...

Ransomware Attack – The Modern Ways of Cyber Extortion
Ransomware Attack – The Modern Ways of Cyber Extortion

The recent ransomware attack has changed the definition of centuries-old style of demanding ransom. Typically what we know earlier that, the bad guys kidnapped a person or an item and held captive to extort...

How Ethical Hacking is Helping IT Security?
How Ethical Hacking is Helping IT Security?

While hackers have been causing a lot of pains to enterprises, another community of hackers have also been finding out vulnerabilities in the IT systems, albeit with a different objective. Such hackers,...
Advertisements