
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 987 Articles for Safe & Security

3K+ Views
AIAI or Artificial Intelligence is a science which deals with making machine intelligence. It utilizes image processing, cognitive science, neural systems, machine learning etc. AI enables machines to behave in a similar manner as human behaves in varying situations.Expert SystemExpert System is an application using AI to build a knowledge base and use that knowledge base to solve such problems where human experts are needed to solve the problem. An expert system can advise users on the problem and can provide an explanation of the solution which is required for the users.Following are some of the important differences between AI ... Read More

863 Views
Facial RecognitionFacial recognition is a technique in which a person is identified using his/her face. The system captures the facial expression details, analyzes and compares with an existing database of known faces to find a match. The face detection process helps to locate people in images and videos.Face IDFace ID is an advanced face recognition technology first unveiled in iPhone X. Face ID is very reliable and advanced biometric technology used in iPhones.The following are some of the important differences between Facial Recognition and Face ID.Sr. No.KeyFacial RecognitionFace ID1DefinitionFacial Recognition is a software application that is capable of verifying a ... Read More

46K+ Views
Private Keys and Public Keys terms are used in cryptography. These keys are used to encrypt/decrypt sensitive data. Read through this article to find out more about private and public keys and how they are different from each other.What is Private Key?The private key is used in both encryption as well as decryption. This key is shared between the sender and receiver of the encrypted sensitive information. The private key is also called "symmetric" because it is shared by both parties. Private key cryptography is faster than public-key cryptography mechanism.A private key is generally a lengthy, non-guessable sequence of bits ... Read More

341 Views
UAC (User account control ) is a windows IS security that enables a user to perform limited number of admin operations. Overall, it prevents normal users from performing specific actions that could pose a security risk to the system by requiring users to have admin-level permission. For security reasons enabling UAC to detect application installations and prompt for elevation to prevent regular user accounts from installing unauthorized software on clients is a best practice within Windows OS environments.In this tutorial, we shall investigate how to elevate the admin-level right from the end of a normal logged-in user by bypassing UAC ... Read More

320 Views
If we think an advance level of anti-virus has been installed on our computer, and we are fully secure as it performs a full system threat infection scan regularly. However, there may be instances where the scan did not detect any threat, or you cannot perform a scan. In these scenarios, we recommend that to notice the aggressive methods or symptoms to detect threats or attack.If it has been noticed an unwarranted presence of PowerShell in the task manager then our computer is definitely under attack.If a connection found to be established on port 4444 or 445 without your cognizance ... Read More

217 Views
While hackers have been causing a lot of pains to enterprises, another community of hackers have also been finding out vulnerabilities in the IT systems, albeit with a different objective. Such hackers, known as ethical hackers, proactively identify IT system vulnerabilities by hacking into the systems. Ethical hackers are a boon to enterprises because they identify potential vulnerabilities without any malicious intent. Enterprises can fix the issues before hackers can exploit them. Ethical hackers are being increasingly recognized – reputed organizations have been paying bounties to ethical hackers to find security loopholes in their systems that are hitherto undetected.Who is ... Read More

511 Views
Beware of all the internet surfers; the Fireball virus is coming to compromise your security!! Your internet browser is at high risk, as the browser attacking nasty virus can take control of your browser and do whatever it want without your consent. It can even run malicious codes, download files and much more on your own machine without your knowledge.After the dangerous WannaCry Ransomware attack which gave sleepless nights to millions of people worldwide, now another dirty virus called as “Fireball” is on attacking spree to make its victims around the world. As per the latest reports, the Fireball malware ... Read More

198 Views
The usage of the smartphone has witnessed exponential growth in recent times. The benefit of using a smart device coupled with an active internet connection is endless. However, with multiple advantages, there is a possibility of unwanted suspicious threats. These threats are regarding the fall of your sensitive data which is present inside a mobile which may go into wrong hands through malware or spyware.Though most mobile users think antivirus as the only savior from a disaster, they lack the knowledge of judging the best one among all available. It takes a lot of parameters to decide the exact worthiness ... Read More

669 Views
Imagine standing in front of the entrance door to your office and see your face flash up on a large screen. If the screen identifies you, it opens the doors; if it doesn’t the doors don’t open. Your face is your digital ID. It allows you to enter your office and authenticate your identity in a hoard of other places. Sounds uncanny, but is undeniably remarkable! This not so old technology is on its way to becoming ubiquitous.Enter the world of face detection and recognition systems…recognizing the face from all angles, with even more accuracy than a person can. Using ... Read More

164 Views
The recent WannaCry ransomware attack is so massive that it has affected more than 2, 00, 000 machines across 150 countries around the globe. There are individuals, various institutions and government agencies who became victims of this cyber extortion. Now all of them are desperately looking for a solution to retrieve their locked data. They may not want to pay the demanded ransom amount, but if they will not able to find a suitable solution then, may end up paying the ransom to the blackmailers.While paying the ransom amount, there is no guaranty that whether you will get back your ... Read More