Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Anti Virus Articles - Page 37 of 43
486 Views
In the realm of data security, encryption and hashing are frequently contrasted, but why is this so? Encryption is a two-way function in which data is passed in as plaintext and comes out as unreadable ciphertext. Because encryption is two-way, the data may be decrypted and read again. Hashing, on the other hand, is a one-way process in which the plaintext gets scrambled into a unique digest that cannot be decrypted using a salt. Although hashing may be reversed technically, the computer power required to decrypt it makes decryption impractical.A hashing algorithm is used to do hashing. This approach is ... Read More
445 Views
Jobs that required us to commute to work physically can now be completed at home in a pair of comfortable pyjamas, thanks to technological advancements. Most of the world's work has gone online, especially after the spread of the Coronavirus, and schools and universities have followed suit. This trend does not appear to go anywhere anytime soon. There are many solid reasons for it: Remote employment has been connected to a slew of advantages for employees and lower overhead expenses for businesses.On the other hand, working remotely brings new concerns and obstacles, particularly in terms of network security. Home networks ... Read More
584 Views
We live in a world where information reigns supreme, a world where our use of data propels us ahead. This is, for the most part, a good thing. Information aids us in making better decisions, enriching our lives, and improving the lives of those around us. However, there is a dark side to information, a place in the shadows where individuals who desire to exploit the information of others can be found. Others take information for personal benefit, while others are merely nosy. The latter is more critical since it has far-reaching consequences. Bluesnarfing is a method used by burglars ... Read More
5K+ Views
Let us begin by learning about a security group in Amazon Web Services (AWS).Security Group in AWSA Security group acts as a virtual firewall which controls the traffic for one or more instances whenever we launch an instance, we can specify one or more security groups. Generally, we use the default security group.If you have requirements that are not met by a security group, we can maintain our own firewall on any of our instances in addition to using security groups. If we need to allow traffic to a window instance we can use Amazon EC2 security group.AWS security group ... Read More
343 Views
Let us understand the concepts of antivirus software and endpoint security.Antivirus softwareIt is developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers etc. It is a program, mainly performs functions like to scan, detect and remove viruses from your computer.Examples &mius; Windows Defender, AVG, AVAST, McAfee. Kaspersky etc.Features of an Effective AntivirusThe features of an effective antivirus are as follows −Default-Deny ProtectionAuto Sandbox TechnologyContainment TechnologyHost Intrusion Protection System (HIPS)AdvantagesThe advantages of an effective antivirus are as follows −Virus protectionWeb ProtectionSpam protectionCost effectiveFirewall featureDisadvantagesThe disadvantages of an effective antivirus are as follows −System slowdownSecurity holesMore advertisementsNo ... Read More
2K+ Views
Let us understand the concepts of antivirus software and antispyware.Antivirus softwareIt is a program which is designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs mainly perform the function like to scan, detect and remove viruses from your computer.The different versions present in market are as follows −Windows DefenderAVGAVASTMcAfeeKasperskyThe virus is stored in a distinct vicinity referred to as a vault in which it has a different file machine due to which virus impacts it. Users can themselves coach antivirus to delete computer virus, put it in a vault ... Read More
3K+ Views
Network communication is nothing but a conversation between two persons. Let us consider a real life situation, for two people to communicate effectively, the first and foremost requirement is language.If they both do not know a common language communication is simply not possible. They will first say 'Hi', 'How are you' etc and do a handshake.Similar to this, in computer communication, for two computers to effectively communicate we need the following −Set of procedures for handshakingSet of rules for interpreting the data sentSteps for recovery if communication is broken in the middle.Network protocols are a set of standards which facilitate ... Read More
2K+ Views
Internet-based threats are Malware programs which can be targeted when we use the Internet. These Web-based threats include a range of malicious software programs which are designed to infect victims' computers.Major Threats on InternetSome of the major threats on internet are as follows −SpamGenerally we received a lot of Emails with' spam ' or Junk folder insinuates that spam emails are huge issues, with more than Half of the emails being siphoned into these folders. Being an annoyance, spam emails are not a direct threat but they contain malware.TrojanTrojan represents harmless computer programmes. So we don't detect them and that's ... Read More
2K+ Views
A computer virus is a malware, which corrupts or destroys our files on the system. The computer virus is not a new thing to us. It was created and started spreading around the 1980's. Virus is a type of malware which is capable of self-replicating itself and spreads from one machine to another.Generally, Computer virus is a program which controls the computer without the knowledge of the user and it runs parallel with the internet. If more devices are connected and all people are using the web obviously threat and security risk are increasing.Types of Computer VirusesSome of the types ... Read More
323 Views
You're not alone if you use your phone to check your email, pay your bills, or post to social media. Consider what would happen if your phone suddenly stopped working: no data, no text messages, no phone calls. Imagine being notified by your cellular operator that your SIM card has been activated on a new device. What exactly is going on? These could be symptoms of your SIM card being switched and your phone number being stolen.This article will explain what SIM swapping is and what the big phone providers are doing about it. We'll highlight individual wireless carriers' answers ... Read More