Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Safe & Security Articles
Page 88 of 88
Gmail Productivity Tips
In this super busy world of professional environment, it makes it challenging for each one of us to organize and use our emails effectively and efficiently. Whether it’s customizing, sorting, searching, automating your emails, Gmail offers dozens of ways to managing your inbox easily. Gmail is simple enough to use and to make you become a Gmail power user. We bring you some tips which will help you get to the next level of productivity.Labeling your EmailsLabeling your emails makes it easy and effective in organizing your inbox. Emails can be automatically given a label and you can also create ...
Read MoreDelete Your Chrome History Selectively
From time to time, clearing browsing history on chrome is a good habit, many do it as this particular action of theirs, help protect their privacy and prevent everyone having access to their personal computer from collecting information about them by having a glance at their browsing history.Chrome browser offers the best erase tool which lets you delete your browsing logs from the beginning or day, week or month. However, if you wish to delete your history selectively or if you want to delete one particular site or few sites from Chrome memory.Chrome Browsing HistorySimilar to other web browsers, Google ...
Read More10 Ways to keep your Data safe in Cloud Environment
A “cloud” in the technological sense, can be defined as a huge online place for storing and accessing data and program files in the internet, instead of your computer hardware- like local disk. When we talk about storing and accessing data, our first concern is how secure is our data, how much can we rely on the cloud environment. Cloud environment is as safe as data stored in an individual data server.Cloud is the latest trend in technology and most of us store all data in cloud housed in Dropbox, Google Drive. Generally, people assume that all the data stores ...
Read MoreSecurity Testing – The Need of the Hour
Yahoo! recently confirmed that a massive data breach occurred to their system in late 2014 and due to that at least 500 million users account information may have been hacked. The statement by Yahoo spokes-person states that the account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers.Another news from the USA, the American security agencies recently found that hackers are trying hard to penetrate the voter registry database to get the confidential information, as the election is round the corner. Though they are ...
Read MoreWhat are Digital Signatures and how do they work?
Digital Signature is a mathematical technique which is used to authenticate a digital document. This is equivalent to handwritten signature or a stamped seal and offers far more security and integrity to the message or digital document. It solves the problem of impersonation in digital communications by providing evidence of origin, identity and status of the digital transactions. Many countries like the United States of America consider digital signatures as legal. They even publish public laws, private laws and the Budget with digital signatures.How does a Digital Signature Work?Digital signatures are based on asymmetric cryptography, which means that the information ...
Read More