Found 1010 Articles for Safe & Security

Difference between Antivirus and Internet Security

Kiran Kumar Panigrahi
Updated on 27-Jul-2022 10:17:32

2K+ Views

Both Internet Security and Antivirus are the techniques that are being used to protect the user from malicious programs by blocking and removing them specifically when the user interacts with external resources.An Antivirus could be defined as an application or software which provides security from the malicious software specifically coming from the Internet. In contrast, Internet Security is a term that is used for a wide range of issues; we can think of it as a collection of Apps designed to protect users from online threats.In this article, we will take a look at the different features of an Antivirus ... Read More

Difference between Virus, Worm and Trojan Horse

Kiran Kumar Panigrahi
Updated on 25-Aug-2022 12:55:15

12K+ Views

Viruses, Worms, and Trojan Horses are types of malicious software that infiltrate a system and try to create havoc, however what sets them apart is the way they attack, spread, and replicate. Read though this article to get an overview of how a virus is different from a worm, and what exactly is a Trojan Horse. What is a Virus? A virus is malicious software (malware) made up of little bits of code attached to legitimate programs. When that software is launched, the virus is launched as well. Viruses are malicious programs that infect computer files and spread ... Read More

How to Secure ZOOM application

Ajay yadav
Updated on 20-Apr-2020 06:09:00

112 Views

This article poses a common advisory and security measure note for the Zoom users to protect themself from presumptive hacking attempt, as this application is quite vulnerable to breach. Zoom is quite trending and its popularity mysteriously skyrocket in last 3 month in terms of downloads (20 CR) despite having other plethora of amazing video conferencing application. Zoom does not have the End-to-end encryption facility like whatsapp and WebEx and attackers can potentially gain control to the ZOOM without its user’s cognizance by mean of a secret tools called zWarDial.However, I am not going to discuss the usage of this ... Read More

Difference between Threat and Attack

Kiran Kumar Panigrahi
Updated on 27-Jul-2022 09:40:17

16K+ Views

From a security standpoint, threats and attacks are two critical occurrences. From the perspective of network security, it is critical to grasp the differences between the two.A threat in the realm of information security is the presence of a persistent hazard to information integrity. This might take the shape of a human, a computer virus or malware, or something else.An attack, on the other hand, is the actual act of exploiting the information security system's weaknesses.There are a number of network security dangers and attacks to be aware of, such as Information theft and fraud, putting a halt to routine ... Read More

Difference between Malware and Adware

Kiran Kumar Panigrahi
Updated on 22-Aug-2022 14:58:23

1K+ Views

A Malware is a malicious program that is used by attackers to perform illegal operations on a user's machine, such as stealing personal information, corrupting system/network, encrypting data for "ransom" or deleting the data, etc.An Adware is a program that displays Ads during its execution. Developers get money from this advertisement. This application may capture user activity and display ads accordingly. An attacker can misuse this feature of adware and can compromise the system security.Read through this article to find out more about Malware and Adware and how they are different from each other.What is a Malware?Malware is any program ... Read More

Difference between AI and Expert System

Mahesh Parahar
Updated on 15-Apr-2020 08:40:40

2K+ Views

AIAI or Artificial Intelligence is a science which deals with making machine intelligence. It utilizes image processing, cognitive science, neural systems, machine learning etc. AI enables machines to behave in a similar manner as human behaves in varying situations.Expert SystemExpert System is an application using AI to build a knowledge base and use that knowledge base to solve such problems where human experts are needed to solve the problem. An expert system can advise users on the problem and can provide an explanation of the solution which is required for the users.Following are some of the important differences between AI ... Read More

Difference between Facial Recognition and Face ID

Mahesh Parahar
Updated on 15-Apr-2020 08:29:34

643 Views

Facial RecognitionFacial recognition is a technique in which a person is identified using his/her face. The system captures the facial expression details, analyzes and compares with an existing database of known faces to find a match. The face detection process helps to locate people in images and videos.Face IDFace ID is an advanced face recognition technology first unveiled in iPhone X. Face ID is very reliable and advanced biometric technology used in iPhones.The following are some of the important differences between Facial Recognition and Face ID.Sr. No.KeyFacial RecognitionFace ID1DefinitionFacial Recognition is a software application that is capable of verifying a ... Read More

Difference between Private Key and Public Key

Kiran Kumar Panigrahi
Updated on 01-Nov-2023 01:15:19

39K+ Views

Private Keys and Public Keys terms are used in cryptography. These keys are used to encrypt/decrypt sensitive data. Read through this article to find out more about private and public keys and how they are different from each other.What is Private Key?The private key is used in both encryption as well as decryption. This key is shared between the sender and receiver of the encrypted sensitive information. The private key is also called "symmetric" because it is shared by both parties. Private key cryptography is faster than public-key cryptography mechanism.A private key is generally a lengthy, non-guessable sequence of bits ... Read More

Windows UAC protection Bypass

Ajay yadav
Updated on 18-Mar-2020 08:11:36

237 Views

UAC (User account control ) is a windows IS security that enables a user to perform limited number of admin operations. Overall, it prevents normal users from performing specific actions that could pose a security risk to the system by requiring users to have admin-level permission. For security reasons enabling UAC to detect application installations and prompt for elevation to prevent regular user accounts from installing unauthorized software on clients is a best practice within Windows OS environments.In this tutorial, we shall investigate how to elevate the admin-level right from the end of a normal logged-in user by bypassing UAC ... Read More

Cyber Attack Symptoms

Ajay yadav
Updated on 18-Mar-2020 07:20:54

183 Views

If we think an advance level of anti-virus has been installed on our computer, and we are fully secure as it performs a full system threat infection scan regularly. However, there may be instances where the scan did not detect any threat, or you cannot perform a scan. In these scenarios, we recommend that to notice the aggressive methods or symptoms to detect threats or attack.If it has been noticed an unwarranted presence of PowerShell in the task manager then our computer is definitely under attack.If a connection found to be established on port 4444 or 445 without your cognizance ... Read More

Advertisements