- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1010 Articles for Safe & Security
2K+ Views
Both Internet Security and Antivirus are the techniques that are being used to protect the user from malicious programs by blocking and removing them specifically when the user interacts with external resources.An Antivirus could be defined as an application or software which provides security from the malicious software specifically coming from the Internet. In contrast, Internet Security is a term that is used for a wide range of issues; we can think of it as a collection of Apps designed to protect users from online threats.In this article, we will take a look at the different features of an Antivirus ... Read More
12K+ Views
Viruses, Worms, and Trojan Horses are types of malicious software that infiltrate a system and try to create havoc, however what sets them apart is the way they attack, spread, and replicate. Read though this article to get an overview of how a virus is different from a worm, and what exactly is a Trojan Horse. What is a Virus? A virus is malicious software (malware) made up of little bits of code attached to legitimate programs. When that software is launched, the virus is launched as well. Viruses are malicious programs that infect computer files and spread ... Read More
112 Views
This article poses a common advisory and security measure note for the Zoom users to protect themself from presumptive hacking attempt, as this application is quite vulnerable to breach. Zoom is quite trending and its popularity mysteriously skyrocket in last 3 month in terms of downloads (20 CR) despite having other plethora of amazing video conferencing application. Zoom does not have the End-to-end encryption facility like whatsapp and WebEx and attackers can potentially gain control to the ZOOM without its user’s cognizance by mean of a secret tools called zWarDial.However, I am not going to discuss the usage of this ... Read More
16K+ Views
From a security standpoint, threats and attacks are two critical occurrences. From the perspective of network security, it is critical to grasp the differences between the two.A threat in the realm of information security is the presence of a persistent hazard to information integrity. This might take the shape of a human, a computer virus or malware, or something else.An attack, on the other hand, is the actual act of exploiting the information security system's weaknesses.There are a number of network security dangers and attacks to be aware of, such as Information theft and fraud, putting a halt to routine ... Read More
1K+ Views
A Malware is a malicious program that is used by attackers to perform illegal operations on a user's machine, such as stealing personal information, corrupting system/network, encrypting data for "ransom" or deleting the data, etc.An Adware is a program that displays Ads during its execution. Developers get money from this advertisement. This application may capture user activity and display ads accordingly. An attacker can misuse this feature of adware and can compromise the system security.Read through this article to find out more about Malware and Adware and how they are different from each other.What is a Malware?Malware is any program ... Read More
2K+ Views
AIAI or Artificial Intelligence is a science which deals with making machine intelligence. It utilizes image processing, cognitive science, neural systems, machine learning etc. AI enables machines to behave in a similar manner as human behaves in varying situations.Expert SystemExpert System is an application using AI to build a knowledge base and use that knowledge base to solve such problems where human experts are needed to solve the problem. An expert system can advise users on the problem and can provide an explanation of the solution which is required for the users.Following are some of the important differences between AI ... Read More
643 Views
Facial RecognitionFacial recognition is a technique in which a person is identified using his/her face. The system captures the facial expression details, analyzes and compares with an existing database of known faces to find a match. The face detection process helps to locate people in images and videos.Face IDFace ID is an advanced face recognition technology first unveiled in iPhone X. Face ID is very reliable and advanced biometric technology used in iPhones.The following are some of the important differences between Facial Recognition and Face ID.Sr. No.KeyFacial RecognitionFace ID1DefinitionFacial Recognition is a software application that is capable of verifying a ... Read More
39K+ Views
Private Keys and Public Keys terms are used in cryptography. These keys are used to encrypt/decrypt sensitive data. Read through this article to find out more about private and public keys and how they are different from each other.What is Private Key?The private key is used in both encryption as well as decryption. This key is shared between the sender and receiver of the encrypted sensitive information. The private key is also called "symmetric" because it is shared by both parties. Private key cryptography is faster than public-key cryptography mechanism.A private key is generally a lengthy, non-guessable sequence of bits ... Read More
237 Views
UAC (User account control ) is a windows IS security that enables a user to perform limited number of admin operations. Overall, it prevents normal users from performing specific actions that could pose a security risk to the system by requiring users to have admin-level permission. For security reasons enabling UAC to detect application installations and prompt for elevation to prevent regular user accounts from installing unauthorized software on clients is a best practice within Windows OS environments.In this tutorial, we shall investigate how to elevate the admin-level right from the end of a normal logged-in user by bypassing UAC ... Read More
183 Views
If we think an advance level of anti-virus has been installed on our computer, and we are fully secure as it performs a full system threat infection scan regularly. However, there may be instances where the scan did not detect any threat, or you cannot perform a scan. In these scenarios, we recommend that to notice the aggressive methods or symptoms to detect threats or attack.If it has been noticed an unwarranted presence of PowerShell in the task manager then our computer is definitely under attack.If a connection found to be established on port 4444 or 445 without your cognizance ... Read More
To Continue Learning Please Login
Login with Google