
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 446 Articles for Anti Virus

5K+ Views
What is Plaintext?In cryptography, Plaintext is usually plain readable text before it is encrypted into ciphertext or readable text after it is decrypted. Any message, document, file, or the like that is not meant to be encrypted is referred to as plaintext.The input to a cryptosystem is plaintext, and the output is ciphertext. Algorithms in cryptography convert plaintext to ciphertext and ciphertext to plaintext.Plaintext saved in a computer file must be protected since its contents are completely disclosed and hence potentially actionable if it is stolen, disclosed, or sent without permission. If data is to be saved, the storage medium, ... Read More

991 Views
An eavesdropping assault, also known as a sniffing or spying attack, is when data is stolen from a computer, smartphone, or other connected while the data is transferred over a network. The attack uses unsecured network communications to get access to data as it is sent or received by the user.The term "eavesdropping" is deceptively gentle. Typically, the attackers are looking for sensitive financial and corporate data that can be sold for illicit purposes. Spouse ware, which allows people to eavesdrop on their loved ones by tracking their smartphone usage, is also a big business.Because the network transmissions appear to ... Read More

579 Views
Duqu is a family of computer malware that is considered to be linked to the Stuxnet worm. Duqu has taken advantage of a zero-day vulnerability in Microsoft Windows.Duqu virus is made up of a number of software components that work together to help the attackers. This includes information-stealing capabilities, kernel drivers, and injection tools that run in the background.A portion of this malware is written in the "Duqu framework, " an unnamed high-level programming language. It's not C++, Python, Ada, Lua, or any of the other languages that have been tested. However, it's possible that Duqu was developed in C ... Read More

1K+ Views
Scavenging in cyber security is the process of sifting through a system's data residue in search of sensitive or confidential information. Data scavenging is usually the first stage in any purposeful network assault. To discover as much as possible about a target firm, the attacker employs a combination of network-based tools and Internet search engine searches.Scavenging occurs when top-level hackers dump stolen credentials from a database compromise into a temporary public document for others to utilize. Once they have your information, the hackers try your password on well-known services like PayPal.Why is it Difficult to Detect a Scavenging Attack?For two ... Read More

540 Views
Malicious hackers created a fork bomb, also known as a wabbit or rabbit virus, to execute a denial-of-service attack on the target computer. The fork bomb replication occurs and wreaks havoc on the system's resources. It bogs down the system's performance and can even cause the system to crash owing to a lack of resources.It is a denial of service (DoS) attack that repeatedly uses the fork system call until all system resources have executed a command. Over time, the system becomes overburdened and unable to react to any input.A fork is a Unix and Linux system call that duplicates ... Read More

220 Views
Due to the prevalent use of security software on mobile phones and industry groups targeting malicious transactions, cyber thieves have turned to a new type of malware called chargeware.Chargeware is a type of malware that collects money from the victims without their knowledge or permission. It is a type of malware that infects computers and mobile phones. The program's goal is to trick the user into consenting to a fee and charge confusing terms.Hundreds of thousands of people, especially in France and the United Kingdom, were exposed to similar programs in 2013, installing additional types of malware on their smartphones.Chargeware ... Read More

931 Views
What is Dumpster Diving?Dumpster diving is the practice of exploring garbage for information on a person or company that might be utilized for hacking purposes later. This assault mostly targets major companies or businesses in order to conduct phishing (mainly) by sending victims false emails that look to come from a reputable source.Identity scams take advantage of information gained by breaching the victim's confidentiality. Dumpster divers search the victim's trash for financial statements, government papers, medical bills, résumés, and other documents. Once obtained, the data is utilized to construct identity profiles, increasing the likelihood of social engineering success. Full, usable ... Read More

567 Views
Heartbleed is a critical flaw in the widely used OpenSSL cryptographic software library. This flaw allows information to be stolen that is usually secured by the SSL/TLS cryptography used to secure the Web. SSL/TLS enables communication privacy and security for the internet, mail, messaging services, and some VPNs over the internet.A defect in OpenSSL's implementation of the TLS Heartbeat extension causes the Heartbleed problem, which results in improper input validation.It's an open-source software vulnerability that was initially discovered in 2014. Anyone with access to the Internet can use this flaw to access the memory of system vulnerabilities, leaving no trace ... Read More

4K+ Views
Backdoor Trojans are malicious software programs that provide unauthorized access to a computer in order to launch a remote attack. Remote attackers can use a hacked machine to send commands or gain complete control.Backdoor malware and viruses circumvent authentication protocols in order to gain access to systems and avoid detection. Once a Trojan has gained a footing in a system, it adds itself to the starting routine of the computer, preventing harmful programs from being permanently terminated by rebooting the machine.Backdoor malware is commonly referred to as a Trojan. A Trojan horse is a malicious computer software that masquerades as ... Read More

630 Views
A Gray Hat programmer is a programmer who may violate moral conventions or standards, but not with the malicious intent associated with dark cap programmers. Gray Hat programmers may participate in practices that appear to be less than completely above board, yet they are typically working for the greater good.Gray hat programmers bridge the gap between white cap programmers, who try to ensure that safe frameworks are maintained, and dark cap programmers, who act vindictively to exploit flaws in frameworks.Gray hat hackers are between white and black hat hackers. Gray hat hackers use a combination of black hat and white ... Read More