
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 987 Articles for Safe & Security

296 Views
Let us understand the concepts of antivirus software and endpoint security.Antivirus softwareIt is developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers etc. It is a program, mainly performs functions like to scan, detect and remove viruses from your computer.Examples &mius; Windows Defender, AVG, AVAST, McAfee. Kaspersky etc.Features of an Effective AntivirusThe features of an effective antivirus are as follows −Default-Deny ProtectionAuto Sandbox TechnologyContainment TechnologyHost Intrusion Protection System (HIPS)AdvantagesThe advantages of an effective antivirus are as follows −Virus protectionWeb ProtectionSpam protectionCost effectiveFirewall featureDisadvantagesThe disadvantages of an effective antivirus are as follows −System slowdownSecurity holesMore advertisementsNo ... Read More

2K+ Views
Let us understand the concepts of antivirus software and antispyware.Antivirus softwareIt is a program which is designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs mainly perform the function like to scan, detect and remove viruses from your computer.The different versions present in market are as follows −Windows DefenderAVGAVASTMcAfeeKasperskyThe virus is stored in a distinct vicinity referred to as a vault in which it has a different file machine due to which virus impacts it. Users can themselves coach antivirus to delete computer virus, put it in a vault ... Read More

6K+ Views
Phishing is a type of social engineering attack which is often used to steal user data, including login credentials and credit card numbers and sensitive information without their knowledge that it is being extracted from them.The goal of a phishing attempt is to trick the recipient into taking the attacker’s desired action, such as providing login credentials or other sensitive information.Phishing TechniquesThere are different types of phishing techniques which are as follows −Deceptive PhishingA phisher sends bulk email with a message. Users are influenced to click on a link. These emails are broadcast to a wide group of recipients with ... Read More

2K+ Views
Let us see the detailed analysis and assessment of OSI and TCP/IP protocols.TCP/IPIt is a suite of communication protocols which is used to interconnect network devices on the internet. The Transmission Control Protocol/Internet Protocol (TCP/IP) is also used as a communication protocol in a private network.The entire internet protocol suite is a set of rules and procedures by providing end-to-end communications which identify how it should be broken into packets addressed, transmitted, routed and received at the destination.It is defined to make networks reliable, with the ability to recover automatically from the failure of any device on the network.History of ... Read More

417 Views
Let us begin by understanding the concepts of DCS Network Communication Protocol and the Field Communication Protocol.DCS Network Communication ProtocolGenerally, a system convention characterizes principles and traditions for correspondence between arranging gadgets. It incorporates components for gadgets to recognize and make associations with each other, and in addition designing standards that determine how information is bundled into messages sent and received. A few conventions likewise bolster message affirmation and information pressure intended for dependable and additionally superior system correspondence.Current conventions for PC organizing all by and large utilize parcel changing systems to send and get messages as bundles - messages ... Read More

3K+ Views
Network communication is nothing but a conversation between two persons. Let us consider a real life situation, for two people to communicate effectively, the first and foremost requirement is language.If they both do not know a common language communication is simply not possible. They will first say 'Hi', 'How are you' etc and do a handshake.Similar to this, in computer communication, for two computers to effectively communicate we need the following −Set of procedures for handshakingSet of rules for interpreting the data sentSteps for recovery if communication is broken in the middle.Network protocols are a set of standards which facilitate ... Read More

2K+ Views
Internet-based threats are Malware programs which can be targeted when we use the Internet. These Web-based threats include a range of malicious software programs which are designed to infect victims' computers.Major Threats on InternetSome of the major threats on internet are as follows −SpamGenerally we received a lot of Emails with' spam ' or Junk folder insinuates that spam emails are huge issues, with more than Half of the emails being siphoned into these folders. Being an annoyance, spam emails are not a direct threat but they contain malware.TrojanTrojan represents harmless computer programmes. So we don't detect them and that's ... Read More

2K+ Views
A computer virus is a malware, which corrupts or destroys our files on the system. The computer virus is not a new thing to us. It was created and started spreading around the 1980's. Virus is a type of malware which is capable of self-replicating itself and spreads from one machine to another.Generally, Computer virus is a program which controls the computer without the knowledge of the user and it runs parallel with the internet. If more devices are connected and all people are using the web obviously threat and security risk are increasing.Types of Computer VirusesSome of the types ... Read More

4K+ Views
RSA is a cryptosystem for public-key encryption, and is broadly used for securing responsive information, specifically when being sent over an insecure network including the Internet.In RSA cryptography, both the public and the private keys can encrypt a message; the inverse key from the one used to encrypt a message is used to decrypt it. This attribute is one reason why RSA has develop into the most broadly used asymmetric algorithm. It supports an approach of assuring the confidentiality, integrity, authenticity and non-reputability of digital connection and data storage.RSA need a multiplicative group G =< Z$\mathrm{\phi}$n, *, X > for ... Read More

22K+ Views
RSA is a cryptosystem for public-key encryption, and it is broadly used for securing sensitive information, specifically when being sent over an insecure network including the Internet.RSA algorithm is the most popular asymmetric key cryptographic algorithm depends on the mathematical fact that it is simply to discover and multiply large prime numbers but complex to factor their product. It needs both private and public key.Example of RSA AlgorithmLet us take an example of this procedure to learn the concepts. For ease of reading, it can write the example values along with the algorithm steps.Choose two large prime numbers P and ... Read More