Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles on Trending Technologies
Technical articles with clear explanations and examples
Why do hackers love Public WiFi?
We often go to places where we are being provided with Free WiFi, and we connect our devices to that public WiFi thinking that it's free, but how many times do we think of the consequences one might have to face while connecting to that free WiFi?In this post, we will see how public WiFi is home for hackers to find their victims.Public WiFi is Less SecurePublic WiFi or Hotspots are mainly found in places like hotels, airports, restaurants, coffee shops, etc., where people usually go in large numbers and more frequently.Using a public WiFi may seem harmless in checking ...
Read MoreWhy does cleaning a computer matter?
Before starting this article, let me tell you something that you might not be aware of; that is February 13th every year is known to be "Nation Clean Out Your Computer Day".By cleaning, we do not mean cleaning off the dust from your hardware devices like your CPU, cleaning your desktop screen, or arranging your PC table, which most Indian mothers typically do once a week while dusting the house. Here, cleaning your computer means removing the unwanted files and software from the system, keeping your hard drives free from unwanted storage, and keeping all the required programs up to ...
Read MoreWhat is Spoofing and what are its types?
Technically, the term "spoofing" means an attempt or attack in your network security without your knowledge pretending to be someone else.They are not to steal your data, gain access to your system, and invade your privacy.A prevalent example of spoofing is sending mail from a false sender’s address pretending to be someone and asking them for their sensitive data or giving a link to some malicious website or app.There are so many types of spoofing, but these days, these ten are the most commonly used, and hence having awareness about them might save you from the trouble −ARP SpoofingHere, cyber ...
Read MoreWhat is Discord Virus?
Before knowing what a Discord Virus is, I feel you should be learning what is "Discord". It is one of the most popular VoIP chatting applications of recent times, primarily used by gamers to interact while playing games.Since it has a vast user base, it is always in the eyes of cyber attackers to spread their malware quickly, and these malware programs spread through the discord application are termed discord viruses.Cyber attackers use various techniques to attract discord users to install malicious programs in their systems. They fool users in multiple ways like fake games, utility software, pirated applications, etc., ...
Read MoreWhat is Smishing?
We all would be aware of the term Phishing. Smishing is a kind of Phishing that uses mobile phones as its platform to collect all the personal details like bank account numbers or passwords. And as the name suggests already, they Phish through the text messages known as SMS in phone language, therefore, termed SMiShing. It is also sometimes referred to as text Phishing.SMS stands for short message services, and Smishing uses these text messages as most people trust phone messages more than an email because they think finding a phone number for some unknown person is complex compared to ...
Read MoreWhat is PDF Virus?
As we all know, the main factor that cyber attackers use to spread their malicious viruses is a huge user base. Currently, there is no better medium in sharing documents than sharing them in the form of PDF in terms of having a huge user base. And that's why PDF devices have become a prime target for cyber attackers to spread malicious viruses.Since Pdf also contains few dynamic elements, hackers can execute a code or program on your system. For example, it can have hidden or encrypted files or may include suspicious flash files. Also, since JavaScript is used here, ...
Read MoreHow to remove Amazonaws Virus?
As the name suggests, Amazonaws is a cloud service provided by Amazon, which allows the website makers to host their hefty files or their large codes on the Internet. There are many companies that offer this kind of service, but Amazonaws is a legitimate domain owned just by Amazon.However, many hackers misuse it to display all the irrelevant and unwanted pop-ups to users working on the Internet, which is what is known as the Amazonaws virus.So, if you frequently get pop-ups from Amazonaws.com, it means that your system is infected by this virus and there is an adware or web ...
Read MoreHow to detect Spyware on an Android device?
Spyware is a way in which someone can track you through your android phone by just installing software in it or can send you some third-party link on your phone through text message or email, or social media. When you click on that link, the application gets automatically downloaded without you being aware of it.However, there are a few steps or general signs which might help you to detect if there is any spyware present on your mobile or not. Here are those steps −Your device can hang more often and become very slow while working. This is generally because ...
Read MoreNode.js – util.callbackify() Method
The util.callbackify() method takes an async function as a parameter (or a function with Promise) and returns a function with the callback style. The callback will hold the rejection reason as the first parameter (or null in case of Promise) and the resolved value as the second parameter.Syntaxutil.callbackify(function)Parametersfunction − The input parameter for the async_function required for callback.Example 1Create a file "callbackify.js" and copy the following code snippet. After creating the file, use the command "node callbackify.js" to run this code.// util.callbackify() demo example // Importing the util module const util = require('util'); // Defining a simple async function ...
Read MoreNode.js – hash.copy() Method
The Hash class is one of the many utility classes that is used for creating the hash digests of data. The hash.copy() method creates a new Hash object that will contain a deep copy of the internal state of the current hash object.Syntaxhash.copy([options])Parametersoptions −This input parameter takes input to control the stream behaviour and therefore will contain the stream.tranformOptions.Example 1Create a file "hashCopy.js" and copy the following code snippet. After creating the file, use the command "node hashCopy.js" to run this code.// hash.update() demo Example // Importing the crypto module const crypto = require('crypto'); // Defining the hash ...
Read More