Safe & Security Articles

Page 88 of 88

Gmail Productivity Tips

karthikeya Boyini
karthikeya Boyini
Updated on 20-Jan-2020 279 Views

In this super busy world of professional environment, it makes it challenging for each one of us to organize and use our emails effectively and efficiently. Whether it’s customizing, sorting, searching, automating your emails, Gmail offers dozens of ways to managing your inbox easily. Gmail is simple enough to use and to make you become a Gmail power user. We bring you some tips which will help you get to the next level of productivity.Labeling your EmailsLabeling your emails makes it easy and effective in organizing your inbox. Emails can be automatically given a label and you can also create ...

Read More

Delete Your Chrome History Selectively

karthikeya Boyini
karthikeya Boyini
Updated on 20-Jan-2020 4K+ Views

From time to time, clearing browsing history on chrome is a good habit, many do it as this particular action of theirs, help protect their privacy and prevent everyone having access to their personal computer from collecting information about them by having a glance at their browsing history.Chrome browser offers the best erase tool which lets you delete your browsing logs from the beginning or day, week or month. However, if you wish to delete your history selectively or if you want to delete one particular site or few sites from Chrome memory.Chrome Browsing HistorySimilar to other web browsers, Google ...

Read More

10 Ways to keep your Data safe in Cloud Environment

Sharon Christine
Sharon Christine
Updated on 20-Jan-2020 236 Views

A “cloud” in the technological sense, can be defined as a huge online place for storing and accessing data and program files in the internet, instead of your computer hardware- like local disk. When we talk about storing and accessing data, our first concern is how secure is our data, how much can we rely on the cloud environment. Cloud environment is as safe as data stored in an individual data server.Cloud is the latest trend in technology and most of us store all data in cloud housed in Dropbox, Google Drive. Generally, people assume that all the data stores ...

Read More

Security Testing – The Need of the Hour

Sharon Christine
Sharon Christine
Updated on 17-Jan-2020 201 Views

Yahoo! recently confirmed that a massive data breach occurred to their system in late 2014 and due to that at least 500 million users account information may have been hacked. The statement by Yahoo spokes-person states that the account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers.Another news from the USA, the American security agencies recently found that hackers are trying hard to penetrate the voter registry database to get the confidential information, as the election is round the corner. Though they are ...

Read More

What are Digital Signatures and how do they work?

Prasanna Kotamraju
Prasanna Kotamraju
Updated on 30-Jul-2019 622 Views

Digital Signature is a mathematical technique which is used to authenticate a digital document. This is equivalent to handwritten signature or a stamped seal and offers far more security and integrity to the message or digital document. It solves the problem of impersonation in digital communications by providing evidence of origin, identity and status of the digital transactions. Many countries like the United States of America consider digital signatures as legal. They even publish public laws, private laws and the Budget with digital signatures.How does a Digital Signature Work?Digital signatures are based on asymmetric cryptography, which means that the information ...

Read More
Showing 871–875 of 875 articles
« Prev 1 84 85 86 87 88 Next »
Advertisements