Found 987 Articles for Safe & Security

Difference between AI and Expert System

Mahesh Parahar
Updated on 15-Apr-2020 08:40:40

3K+ Views

AIAI or Artificial Intelligence is a science which deals with making machine intelligence. It utilizes image processing, cognitive science, neural systems, machine learning etc. AI enables machines to behave in a similar manner as human behaves in varying situations.Expert SystemExpert System is an application using AI to build a knowledge base and use that knowledge base to solve such problems where human experts are needed to solve the problem. An expert system can advise users on the problem and can provide an explanation of the solution which is required for the users.Following are some of the important differences between AI ... Read More

Difference between Facial Recognition and Face ID

Mahesh Parahar
Updated on 15-Apr-2020 08:29:34

863 Views

Facial RecognitionFacial recognition is a technique in which a person is identified using his/her face. The system captures the facial expression details, analyzes and compares with an existing database of known faces to find a match. The face detection process helps to locate people in images and videos.Face IDFace ID is an advanced face recognition technology first unveiled in iPhone X. Face ID is very reliable and advanced biometric technology used in iPhones.The following are some of the important differences between Facial Recognition and Face ID.Sr. No.KeyFacial RecognitionFace ID1DefinitionFacial Recognition is a software application that is capable of verifying a ... Read More

Difference between Private Key and Public Key

Kiran Kumar Panigrahi
Updated on 01-Nov-2023 01:15:19

46K+ Views

Private Keys and Public Keys terms are used in cryptography. These keys are used to encrypt/decrypt sensitive data. Read through this article to find out more about private and public keys and how they are different from each other.What is Private Key?The private key is used in both encryption as well as decryption. This key is shared between the sender and receiver of the encrypted sensitive information. The private key is also called "symmetric" because it is shared by both parties. Private key cryptography is faster than public-key cryptography mechanism.A private key is generally a lengthy, non-guessable sequence of bits ... Read More

Windows UAC protection Bypass

Ajay yadav
Updated on 18-Mar-2020 08:11:36

341 Views

UAC (User account control ) is a windows IS security that enables a user to perform limited number of admin operations. Overall, it prevents normal users from performing specific actions that could pose a security risk to the system by requiring users to have admin-level permission. For security reasons enabling UAC to detect application installations and prompt for elevation to prevent regular user accounts from installing unauthorized software on clients is a best practice within Windows OS environments.In this tutorial, we shall investigate how to elevate the admin-level right from the end of a normal logged-in user by bypassing UAC ... Read More

Cyber Attack Symptoms

Ajay yadav
Updated on 18-Mar-2020 07:20:54

320 Views

If we think an advance level of anti-virus has been installed on our computer, and we are fully secure as it performs a full system threat infection scan regularly. However, there may be instances where the scan did not detect any threat, or you cannot perform a scan. In these scenarios, we recommend that to notice the aggressive methods or symptoms to detect threats or attack.If it has been noticed an unwarranted presence of PowerShell in the task manager then our computer is definitely under attack.If a connection found to be established on port 4444 or 445 without your cognizance ... Read More

How Ethical Hacking is Helping IT Security?

Sharon Christine
Updated on 24-Jan-2020 08:15:14

217 Views

While hackers have been causing a lot of pains to enterprises, another community of hackers have also been finding out vulnerabilities in the IT systems, albeit with a different objective. Such hackers, known as ethical hackers, proactively identify IT system vulnerabilities by hacking into the systems. Ethical hackers are a boon to enterprises because they identify potential vulnerabilities without any malicious intent. Enterprises can fix the issues before hackers can exploit them. Ethical hackers are being increasingly recognized – reputed organizations have been paying bounties to ethical hackers to find security loopholes in their systems that are hitherto undetected.Who is ... Read More

Fireball – The Virus Which Can Hijack Your Browser

Sharon Christine
Updated on 24-Jan-2020 07:30:46

511 Views

Beware of all the internet surfers; the Fireball virus is coming to compromise your security!! Your internet browser is at high risk, as the browser attacking nasty virus can take control of your browser and do whatever it want without your consent. It can even run malicious codes, download files and much more on your own machine without your knowledge.After the dangerous WannaCry Ransomware attack which gave sleepless nights to millions of people worldwide, now another dirty virus called as “Fireball” is on attacking spree to make its victims around the world. As per the latest reports, the Fireball malware ... Read More

Features that Matter in an Effective Mobile Anti-Virus!!

Sharon Christine
Updated on 24-Jan-2020 07:26:54

198 Views

The usage of the smartphone has witnessed exponential growth in recent times. The benefit of using a smart device coupled with an active internet connection is endless. However, with multiple advantages, there is a possibility of unwanted suspicious threats. These threats are regarding the fall of your sensitive data which is present inside a mobile which may go into wrong hands through malware or spyware.Though most mobile users think antivirus as the only savior from a disaster, they lack the knowledge of judging the best one among all available. It takes a lot of parameters to decide the exact worthiness ... Read More

Face Detection and Recognition Systems

Sharon Christine
Updated on 24-Jan-2020 07:19:10

669 Views

Imagine standing in front of the entrance door to your office and see your face flash up on a large screen. If the screen identifies you, it opens the doors; if it doesn’t the doors don’t open. Your face is your digital ID. It allows you to enter your office and authenticate your identity in a hoard of other places. Sounds uncanny, but is undeniably remarkable! This not so old technology is on its way to becoming ubiquitous.Enter the world of face detection and recognition systems…recognizing the face from all angles, with even more accuracy than a person can. Using ... Read More

WannaCry Ransomware – How to Avoid Such Attacks

karthikeya Boyini
Updated on 23-Jan-2020 11:40:33

164 Views

The recent WannaCry ransomware attack is so massive that it has affected more than 2, 00, 000 machines across 150 countries around the globe. There are individuals, various institutions and government agencies who became victims of this cyber extortion. Now all of them are desperately looking for a solution to retrieve their locked data. They may not want to pay the demanded ransom amount, but if they will not able to find a suitable solution then, may end up paying the ransom to the blackmailers.While paying the ransom amount, there is no guaranty that whether you will get back your ... Read More

Advertisements