Safe & Security Articles - Page 42 of 88
154 Views
Let us understand the concepts of Box and Ubuntu One before learning the differences between them.BoxBox is the Secure Content Cloud, easy-to-use platform that is built for the entire content lifecycle, from starting of file creation and sharing, to co-editing, signature, classification, and retention. We can work securely from anywhere.It was launched in the year 2005 by Box Inc. This company is mainly focus on cloud content management and file sharing service for businesses. It can be supported in windows, macOS, and several mobile platforms.FeaturesThe features of Box are as follows −It is a secure collaboration on any deviceBox is ... Read More
211 Views
Let us understand the concepts of Box and ShareFile before learning the differences between them.BoxBox is the Secure Content Cloud, easy-to-use platform that is built for the entire content lifecycle, from starting of file creation and sharing, to co-editing, signature, classification, and retention. We can work securely from anywhere.It was launched in the year 2005 by Box Inc. This company is mainly focus on cloud content management and file sharing service for businesses. It can be supported in windows, macOS, and several mobile platforms.FeaturesThe features of Box are as follows −It is a secure collaboration on any deviceBox is trusted ... Read More
1K+ Views
The full form of SSL is Secure Socket Layer which is considered to be a standard security technology used for establishing the encrypted link present among the server as well as clients which are mostly the web server and that of the browser or that of the mail server and clients.It is designed to make use of TCP to provide a consistent end-to-end secure service. Every browser might contain the capacity for interacting with that of the secure web server with the use of SSL protocol. With the use of the session keys, right after the handshaking has been done ... Read More
188 Views
Let us understand the concepts of SecureSafe and Ubuntu One before learning the differences between them.SecureSafeSecureSafe was launched by DSwiss AG in the year 2009 and is one of the file hosting services and cloud storage. It also provides password safe, document storage and digital spaces for online collaboration. It is based on the basis of principles of security by design and privacy by design. It offers 100 MB storage space for free and for paid users, it offers 100 GB storage space.FeaturesThe features of SecureSafe are as follows −Password managerFile storage2-factor authenticationData roomsData inheritanceUbuntu OneIt provides a collection of ... Read More
517 Views
Let us understand the concepts of Secure Sockets Layer (SSL) and Secure Shell (SSH) before learning the differences between them.Secure Sockets Layer (SSL)It's an encryption-based Internet security technology. It was designed to protect data integrity, privacy, and authentication in Internet communications. SSL was the precursor of the TLS encryption protocol that we use today. A website that employs SSL/TLS has "HTTPS" in its URL instead of "HTTP."Two services are provided by SSL Records for SSL connections i.e. Confidentiality and Message integrity Data is fragmented in the SSL Record Protocol application. The fragment is compressed before being added with an encrypted ... Read More
254 Views
Let us understand the concepts of Google Drive and MiMedia before learning the differences between them.Google DriveIt is a file storage and synchronization service developed by Google in the year 2012. It allows users to store files, share files and synchronize files on different devices. In order to access and use a Google drive account, you would need to set up a G-mail account.Once you've set up your Google account, you can access Google Drive by going to http://drive.Google.com in your web browser.FeaturesThe features of Google Drive are as follows −Sync Your All FilesSave to Google DriveSave Gmail AttachmentsWork OfflineConvert ... Read More
343 Views
Let us understand the concepts of antivirus software and endpoint security.Antivirus softwareIt is developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers etc. It is a program, mainly performs functions like to scan, detect and remove viruses from your computer.Examples &mius; Windows Defender, AVG, AVAST, McAfee. Kaspersky etc.Features of an Effective AntivirusThe features of an effective antivirus are as follows −Default-Deny ProtectionAuto Sandbox TechnologyContainment TechnologyHost Intrusion Protection System (HIPS)AdvantagesThe advantages of an effective antivirus are as follows −Virus protectionWeb ProtectionSpam protectionCost effectiveFirewall featureDisadvantagesThe disadvantages of an effective antivirus are as follows −System slowdownSecurity holesMore advertisementsNo ... Read More
2K+ Views
Let us understand the concepts of antivirus software and antispyware.Antivirus softwareIt is a program which is designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs mainly perform the function like to scan, detect and remove viruses from your computer.The different versions present in market are as follows −Windows DefenderAVGAVASTMcAfeeKasperskyThe virus is stored in a distinct vicinity referred to as a vault in which it has a different file machine due to which virus impacts it. Users can themselves coach antivirus to delete computer virus, put it in a vault ... Read More
6K+ Views
Phishing is a type of social engineering attack which is often used to steal user data, including login credentials and credit card numbers and sensitive information without their knowledge that it is being extracted from them.The goal of a phishing attempt is to trick the recipient into taking the attacker’s desired action, such as providing login credentials or other sensitive information.Phishing TechniquesThere are different types of phishing techniques which are as follows −Deceptive PhishingA phisher sends bulk email with a message. Users are influenced to click on a link. These emails are broadcast to a wide group of recipients with ... Read More
2K+ Views
Let us see the detailed analysis and assessment of OSI and TCP/IP protocols.TCP/IPIt is a suite of communication protocols which is used to interconnect network devices on the internet. The Transmission Control Protocol/Internet Protocol (TCP/IP) is also used as a communication protocol in a private network.The entire internet protocol suite is a set of rules and procedures by providing end-to-end communications which identify how it should be broken into packets addressed, transmitted, routed and received at the destination.It is defined to make networks reliable, with the ability to recover automatically from the failure of any device on the network.History of ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP