Articles on Trending Technologies

Technical articles with clear explanations and examples

Why you should use a VPN on Public Wi-Fi?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 07-Feb-2022 594 Views

We all have come across a point in life where we have had to use a public WiFi since staying online at all times is necessary for most of us, be it in a hotel, airport, or even a café. Maybe it's because our mobile data is over, or it's just that we have trouble getting a signal there. Anyway, it's always advised to have a VPN while you use public networks since public networks are always dangerous, considering their weak security and high vulnerability to cybersecurity attacks.How Do Hackers Use Public Networks?Hackers have been known to attack public WiFi ...

Read More

What are the signs of a malware attack on Mac?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 07-Feb-2022 371 Views

With a famous advertisement featured during the 1984 Super Bowl, Macintosh (commonly shortened as Mac) computers first acquired popularity among consumers. The series is still popular today, with new variants dubbed iMac for desktop computers and MacBook for laptops.While Macs are more secure than PCs, they are nevertheless and always have been vulnerable to viruses. The Mac operating system is designed to be more secure against viruses and malware, but there are still many ways for malware to get in. Another factor that protects Macs is their lower popularity than PCs; yet, this does not prevent some hackers from targeting ...

Read More

How a WhatsApp call can be used for surveillance?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 07-Feb-2022 3K+ Views

WhatsApp is one of the most used messaging apps globally. Over 2 billion individuals use the instant messaging application. It was first launched in 2009. You can use WhatsApp to message, call, or video chat with pretty much anyone on the earth for free as long as you have Internet access.How Secure is WhatsApp?WhatsApp protects all communication on its platform with end-to-end encryption. Not only are these encryption keys impossible to decrypt, but they also block third parties, like WhatsApp, from accessing messages or calls. That means only you and the person or group with whom you're speaking may read ...

Read More

Divide arguments element-wise and display the result in a different type in Numpy

AmitDiwan
AmitDiwan
Updated on 07-Feb-2022 457 Views

To divide arguments element-wise, use the numpy.divide() method in Python Numpy. The arr1 is considered Dividend array. The arr2 is considered Divisor array. The output is set "float" using the "dtype" parameter.The out is a location into which the result is stored. If provided, it must have a shape that the inputs broadcast to. If not provided or None, a freshly-allocated array is returned. A tuple (possible only as a keyword argument) must have length equal to the number of outputs.NumPy offers comprehensive mathematical functions, random number generators, linear algebra routines, Fourier transforms, and more. It supports a wide range ...

Read More

How does an Adware attack work?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 07-Feb-2022 416 Views

I bet that everyone who browses on the net has seen a lot of advertisement pop-ups or redirect links or maybe something that slides into your screen. It might be something related to your previous searches, such as a bag you just saw on an online shopping platform or the ticket prices you had checked for your vacation plans. I understand how annoying it can get, especially when you’ve tried to close it many times, it just comes back to your screen again. These annoying ads and pop-ups are known as adware, also known as advertising-supported malware. Let us take ...

Read More

How to clean up your online digital footprint?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 07-Feb-2022 540 Views

Every activity you do online is recorded and is permanent; once you're in it, there is no going back, be it a comment that you have posted on your friend's post or a photo you have shared online, everything is a part of your digital footprint. Advertisers and cybercriminals can use this information, including your IP address, usernames and passwords, and other identifying information, to create a digital trail or footprint that advertisers and cybercriminals can use to target you.So how can you delete or clean up this digital footprint of yours? We will be discussing all of it in ...

Read More

PC or Mac: Which is more resistant to cyber threats?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 07-Feb-2022 230 Views

The Mac vs PC debate did not start in the recent past; it was present as long as I can remember, and both the parties have their points of upsides and downsides, but coming to security, which one is more resistant to cyber threats? Let us find out.Cybercriminals are ever-evolving; the cyber threats initially to Macs were far less than those to PC, but hackers always come up with a way to do their job and, recently, even with Mac. Macs are getting quite vulnerable, just like PC.While Macs' elegant look and simplicity contribute to their popularity, the lack of ...

Read More

How does malware get past security software?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 07-Feb-2022 394 Views

Malicious software, or malware, is any software that causes damage to a computer system. Malware can take the shape of worms, viruses, trojans, spyware, adware, and rootkits, among other things, and can steal confidential information, erase documents, or install software that has not been allowed by the user.How Does Malware Get Past Security Software?Malware takes advantage of security flaws (bugs or vulnerabilities) in the operating system's design and applications (such as older versions of Microsoft Internet Explorer supported by Windows XP) and susceptible versions of browser plugins. Even installing new versions of such plugins does not always result in the ...

Read More

Subtract arguments element-wise with different shapes in Numpy

AmitDiwan
AmitDiwan
Updated on 07-Feb-2022 1K+ Views

To subtract arguments element-wise with different shapes, use the numpy.subtract() method in Python Numpy. The out is a location into which the result is stored. If provided, it must have a shape that the inputs broadcast to. If not provided or None, a freshly-allocated array is returned. A tuple (possible only as a keyword argument) must have length equal to the number of outputs.The condition is broadcast over the input. At locations where the condition is True, the out array will be set to the ufunc result. Elsewhere, the out array will retain its original value. Note that if an ...

Read More

Multiply arguments element-wise with different shapes in Numpy

AmitDiwan
AmitDiwan
Updated on 07-Feb-2022 2K+ Views

To multiply arguments element-wise with different shapes, use the numpy.multiply() method in Python Numpy.The out is a location into which the result is stored. If provided, it must have a shape that the inputs broadcast to. If not provided or None, a freshly-allocated array is returned. A tuple (possible only as a keyword argument) must have length equal to the number of outputs.The condition is broadcast over the input. At locations where the condition is True, the out array will be set to the ufunc result. Elsewhere, the out array will retain its original value. Note that if an uninitialized ...

Read More
Showing 46211–46220 of 61,297 articles
Advertisements