
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 987 Articles for Safe & Security

161 Views
Let us understand the concepts of MediaFire and Wuala before learning the differences between them.MediaFireMediaFire is a cloud storage service and file hosting service which became more popular as a platform for sharing large files. It was owned by MediaFire LLC in 2006. Actually, it has a reputation for having poor privacy which is difficult for it to overcome, and because of its limited capabilities it has been kept aside from the list of the best cloud storage services.MediaFire is providing 10GB storage for free and up to 50 GB free with bonuses, we can store all our files, photos, ... Read More

178 Views
Let us understand the concepts of Jumpshare and Wuala before learning the differences between them.JumpshareJumpshare was developed by Jumpshare Inc in the year 2012. It is a visual communication platform. By Using Jumpshare we can share our work and ideas instantly using shareable links. It combines the features like file sharing, screenshot capture, and video recording all in a single platform. It is available in MacOS, iOS, and Microsoft windows.Jumpshare offers free accounts with limited storage, and paid subscriptions with expanded storage and sharing options.FeaturesThe features of Jumpshare are as follows −Share the work visually in seconds.Delivering the work at ... Read More

325 Views
Let us understand the concepts of Box and Tencent Weiyun before learning the differences between them.Tencent WeiyunWeiyun is the cloud storage service from Tencent which is providing a massive 10 TB of free cloud storage for its new customers. It was owned by Tencent Holdings Limited in 2012. It was mostly used by China. It can be available in Chinese and English language.Tencent Cloud is one of the secure, reliable and high-performance cloud compute services provided by Tencent. It is the largest Internet company in China, and Asia. It is providing services to so many people through its products like ... Read More

138 Views
Let us understand the concepts of Box and Zetta before learning the differences between them.ZettaZetta Cloud is one of the high-tech and cutting-edge safety nets which gets broadcasters back on-air, easily, efficiently and quickly helps in natural disasters to viruses. There is a Zetta’s cloud-based Disaster Recovery tool which is used to backup all audio, schedules and metadata.Zetta Cloud quickly restores all of the original data whenever the station is ready to return its live output.FeaturesThe features of Zetta are as follows −It has an ability to work with standard file systems.It has features like Multi-threading, WAN optimization, Advanced Data ... Read More

12K+ Views
Let us understand the concepts of Pretty Good Privacy (PGP) and Secure/Multipurpose Internet mail extension (S/MIME) before learning the differences between them.Pretty Good Privacy (PGP)The full form of PGP is Pretty Good Privacy which is used to provide email with privacy, integrity and authentication.PGP can be helpful in creating secure email messages. It sends the original data into encrypted form called unreadable ciphertext and passed to receiver where data is decrypted into original form by receiver key.For example, consider two users Ram and Hari. Ram creates a session key to encrypt the message and he also encrypts the session key ... Read More

1K+ Views
Let us understand the concepts of Internet of Things (IoT) and Internet of Everything (IoE) before learning the differences between them. Internet of Things (IoT) IoT is called the Internet of Things and it is nothing but an interlinkage between various items that means, the physical items interact with each other and with the external environment with the help of the internet. They can respond to certain external changes and can work in an artificially intelligent manner. It is also helpful in making certain decisions based on the pattern recognition technique.For example − Every morning at 6am the coffee machine ... Read More

5K+ Views
Let us begin by learning about a security group in Amazon Web Services (AWS).Security Group in AWSA Security group acts as a virtual firewall which controls the traffic for one or more instances whenever we launch an instance, we can specify one or more security groups. Generally, we use the default security group.If you have requirements that are not met by a security group, we can maintain our own firewall on any of our instances in addition to using security groups. If we need to allow traffic to a window instance we can use Amazon EC2 security group.AWS security group ... Read More

2K+ Views
A cyber-crime is a criminal act in which someone targets a computer or a network of devices in order to gain illegal rights, steal data from them, frauds etc. This type of crime is carried out using technology which primarily takes place online.Some cyber-crime includes the following −HarassmentCyber-stalkingBullyingTypes of Cyber-crimesThe types of cyber crimes are as follows −HackingIt is a type of cyber crime in which a person tries to identify and exploit weakness in a computer system or a computer network for his own benefits.Some types of hacking are given below −Social Engineering & PhishingMalware-Injecting DevicesCracking PasswordsDistributed Denial-of-ServiceVirus disseminationVirus ... Read More

443 Views
Credit card fraud is a theft that is committed using the credit card information obtained by stealing and committing fraudulent transactions.RisksThe risks associated with credit card frauds are as follows −Not noticing fake credit cards − Due to rush in the business hours, it may be a possibility that the business fails to recognize fake credit cards and incur losses.Matching signatures and names on ID − Sometimes it happens that the business overlooks the signature of the beholder to be present mandatory on the credit card.Storing credit card details − The details may be stored by the service provider to ... Read More

160 Views
Let us understand the concepts of pCloud and SecureSafe before learning the differences between them.pCloudIt is a personal cloud space where we can store our files and folders. It has a userfriendly interface. The software is available for any devices and platforms like iOS and Android devices, MacOSX, Windows OS, and all Linux distributions.By installing pCloud on our computer system the application creates a secure virtual drive that expands our local storage space.Every change that we can make in our pCloud is seen immediately on our system, phone or tablet. All our devices are instantly synchronized and we have direct ... Read More