
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 987 Articles for Safe & Security

2K+ Views
In this post, we will understand the difference between microkernel and monolithic kernel −MicrokernelIt is smaller in size.In this kernel, the services are kept in a separate address space.It executes slowly in comparison to monolithic kernel.It can be extended easily.If a service crashes, it effects the working of the microkernel.The code to build a microkernel is large.Examples of microkernel include: QNX, Symbian, L4Linux, Singularity, K42, Integrity, PikeOS, HURD, Minix, Mac OS X, and Coyotos.Monolithic KernelIn monolithic kernel, both user services and kernel services are kept in the same address space.Monolithic kernel is larger than microkernel.It executes quickly in comparison to ... Read More

4K+ Views
In this post, we will understand the difference between RPC and RMI −RPC (Remote Procedure Call)It is a library.It is an OS dependent platform.It supports procedural programming.It is less efficient in comparison to RMI.It creates more overhead.The parameters passed to RPC is normal data.It is the older version of RMI.It is easy to program in RPC.It doesn’t provide any security.The cost of development is high.Versioning is a complicated process in RPC.Multiple codes will be needed to build a simple application in RPC.RMI (Remote Method Invocation)It is a platform based on Java.It supports object-oriented programming.It is more efficient in comparison to ... Read More

5K+ Views
In computer parlance, security and protection are the two terms that seem similar at first glance. Therefore, most people use them interchangeably, but both are quite different from each other. In this article, we will highlight how "security" is different from "protection". Basically, the measures to prevent the interference with use of local and physical resources of computer systems provided by the operating system are known as security and protection. One major difference between security and protection is that security deals with the external threats on the information, while protection handles the internal threats on the information. Before going ... Read More

1K+ Views
In this post, we will understand the difference between backup and recovery.BackupIt refers to storing a copy of the original data in a separate memory location.It is basically a copy of data that is used to restore the original data in case of a data loss/damage.It is the replication of data.It just keeps one extra copy to ensure data is not lost forever.It helps in giving data protection.It makes the process of data recovery hassle free and easy.It is an affordable process.It is used in production environments.Example - SnapManager helps create a backup of data and everything else in the ... Read More

19K+ Views
Data Hiding and Encapsulation are important concepts in object-oriented programming (OOP). Data hiding helps prevent the illegal or unauthorized access of members of a class, while encapsulation helps in the wrapping up of data members and methods inside a class. The most basic difference between data hiding and encapsulation is that data hiding focuses on data security, while encapsulation focuses on hiding the complexity of the system. Read this article to find out more about Data Hiding and Encapsulation and how they are different from each other. Let's start with a basic overview of these two important concepts, Data Hiding ... Read More

8K+ Views
Cybercriminals use numerous ways to take advantage of the vulnerabilities in the operating system or applications to infiltrate the device or network. One such method is using the Backdoor Attack.In this post, we would discuss what Backdoor Attack is, its types, and how to stay safe from Backdoor Attacks.What is a Backdoor Attack?In cybersecurity terms, a Backdoor Attack is an attempt to infiltrate a system or a network by maliciously taking advantage of software's weak point.Backdoors allow the attackers to quietly get into the system by deceiving the security protocols and gain administrative access. It is similar to the real-life ... Read More

520 Views
To infiltrate into a system, cybercriminals use different methods; Attack Vector is one of them.In this post, we would know in detail what Attack Vector is, why and how do hackers exploit it, and how to protect your system against Attack Vectors.What is Attack Vector?Atack Vector is a malicious term used for describing the path or the method used by cybercriminals to get entry into a system. It allows the attackers to exploit the vulnerabilities and loopholes to deploy malware and conduct other malicious activities on the system.Once the cybercriminals get an entry into the system using the attack vector, ... Read More

280 Views
Google Chrome is unarguably the best internet browser across every platform. It provides its users with a large number of advanced features that enhance their web browsing experience. It is fast, feature-rich, and comes with an excellent user interface.Many of you might not be aware of the fact that the Google Chrome browser in the Windows operating system is capable of performing malware scanning on the entire system.Yes, you can detect and remove the virus and other malware from your system using the Chrome Antimalware feature.In this post, we would know how to use the Google Chrome virus scanner to ... Read More

18K+ Views
Sometimes you might have noticed that the default search engine of your Chrome browser is automatically changed to Bing. If this is happening without any user intervention, it might be because of malware known as Browser Hijacker. Browser Hijacker takes control of your browser and modifies its settings for conducting malicious activities, including changing the default search engine, homepage, and others. In this post, we would discuss how Bing become your Chrome browser's default search engine and how to remove it from Chrome. What is Bing? Bing is one of the most popular search engines on the internet world. In ... Read More

516 Views
In the modern world, smartphones have become an immovable part of everyone's life. It contains almost everything important to a person, for example, banking apps, navigational apps, utility apps, and more. It is, therefore, more than essential to safeguard smartphones at any cost to protects the owner's privacy.Like computers, Android smartphones can also get infected with malicious programs such as viruses, trojans, spyware, adware, and others. Android malware is mainly intended for stealing sensitive information, misguiding users by showing irrelevant ads, and redirecting them to malicious websites. They can infiltrate the device in many ways; for example, users can install ... Read More