Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Safe & Security Articles - Page 33 of 88
448 Views
What are Phishing Attacks?Phishing attacks are one of the biggest and most frequently faced cyber threats faced by organizations these days. Phishing attacks are scams which are increasing with time and cybercriminals are making huge profits out of them.Phishing attacks are the process of sending duplicitous communications that appear to come from a trustworthy source. Common phishing attacks include social media, text messages, by phone, URLs, and most commonly via emails.The goal of Phishing Attacks includes the following −To steal sensitive data like credit card and login informationTo install malware on the victim’s machine systemTo freeze the system as part ... Read More
339 Views
Who is an Ethical Hacker?An Ethical Hacker is scrutinized as a security executive who perform security assessment to protect client’s computer or application from potential security risks and vulnerabilities. Organizations employs ethical hackers to protect their computers and other systems in the network from cyberattacks, and any external and internal risks in the IT infrastructure.A hacker usually tries to gain unauthorized access to a computer system or application; whereas an ethical hacker imparts hack-preventing tactics, installing several technologies to protect the system before falling victim to the hacker.Through this outlook, an ethical hacker can set up a defense team to ... Read More
261 Views
There was a time, long ago, when a phone's sole purpose was to allow us to make calls, send a few texts, and play Snake. However, now that so much of our data-rich lives are contained within the shells of our smartphones, it's more crucial than ever to keep all of our phones safe. Thankfully, locking your phone is now so simple that everyone should do it.Smartphone makers are increasingly incorporating biometric security methods such as Face ID and iris scanning into Android and iOS smartphones, in addition to passcodes, passwords, and patterns, to provide consumers with a faster, more ... Read More
2K+ Views
Applications and drivers continuously remind users that they are out of the current updates. They always seem to pop up just as you're about to conclude something important.New updates often seem to arrive at the most inconvenient moments. Usually, the easiest option is to ignore. They can be annoying, but they aren't there just for the sake of it. There is a slew of compelling reasons to avoid putting off software upgrades. You don't have to worry about money because they're primarily free; all you have to do is schedule time to do them.As more individuals use cloud-based software, updates ... Read More
521 Views
That annoying pop-up window reminding you to update your software is staring you down, begging you to choose between updating and "remind me later." So, what exactly do you do? You decide on the all-too-tempting option of "remind me later, " but we all know what that entails. That's why we're here to explain why keeping your software up to date is critical, especially if you're running a website or server. And how it affects usability, security, and program compatibility.Maintaining an app is similar to purchasing a home and investing time and money into customizing the interiors to fit your ... Read More
2K+ Views
A "whitelist" is a list of organizations that have been approved for permitted access or privileged membership in a certain region of the computer world. These entities might be electronic groups or organizations, restricted websites, or even email addresses. A whitelist may also refer to an actionable promotion or recognition of a company, organization, or individual. This is also known as an "approved list."Whitelists are sometimes used by Internet Service Providers to safeguard their consumers. Commercial, non-commercial, local area network (LAN), program, and application whitelists are all examples of whitelists.Whitelisting, rather than blacklisting problematic websites, is seen as a proactive ... Read More
661 Views
You can download files from nearly any place while you're connected to the Internet. You have the option of purchasing and downloading games, music, movies, and other types of media from reputable sources or shareware and third-party websites. There may be hazards depending on which path you choose, and your device will strive to defend itself and you from cyber threats. Windows Defender SmartScreen comes to the rescue in this situation.What is Windows SmartScreen?Windows 10 comes with various built-in security features to enhance your computer’s security. Windows 10 provides more protection than previous Windows editions, from integrated antivirus screening to ... Read More
416 Views
As the number of cybercrimes increasing each day, Microsoft has come up with a monthly security fix; this is a great initiative since the hackers are continuously trying to find a vulnerability to exploit users.What is Patch Tuesday?Microsoft's monthly security update delivery is known as Patch Tuesday. Patch Tuesday is a monthly event that occurs on the second Tuesday of each month.Microsoft releases these security patches to address vulnerabilities found in its software products so that hackers don't exploit these loopholes.When Microsoft fixes a security vulnerability, it does not disclose the Patch right away. Instead, the business compiles all fixes ... Read More
1K+ Views
In today's world, we are all in the modern era where toddlers to senior citizens use the internet to access their needs and wants; even businesses are now very much internet-focused. Businesses of all sizes can use the internet to gain access to vast amounts of information and other valuable tools vital to their success.While the internet is a fantastic tool when utilised correctly, it also has a lot of negative consequences, such as: Malicious hackers stealing valuable information, minors discovering age-inappropriate content, and lost productivity due to employees spending too much time on unwanted websites are all examples of ... Read More
3K+ Views
Server Message Block ProtocolThe Server Message Block (SMB) Protocol is a Microsoft Windows protocol that allows users to share files, printers, and serial ports across a network. SMBv2 is the most recent version released with Windows Vista and has undergone more revisions under Windows 7.The IBM-developed Server Message Block protocol is a networking protocol. In the 1990s, Microsoft upgraded the protocol, allowing Windows-based networks to create, alter, and delete shared files, printers, and serial ports.SMB is an application layer protocol that interacts through TCP port 445 in most deployments. Compared to similar protocols such as the File Transfer Protocol (FTP), ... Read More