
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 987 Articles for Safe & Security

219 Views
Looking at the safety concerns of your Organization, an anti-virus software is a basic requirement in today’s technology-savvy world. Every now and then, we keep on getting new viruses launched in the market. This, in turn, requires a basic anti-virus software being installed on your PCs.If you are a start-up or a small scale technology firm, it is difficult to invest in a good and costly anti-virus software. Worry Not. We have some great anti-virus software available in the market for free or we can say at a very less price. These products are free only for non-commercial use; if ... Read More

152 Views
A Government Organization CERT (Computer Emergency Response Team) has issued a high priority alert that a new ransomware Locky has spread like ransomware WannaCry which has compromised a huge number of the computer system in the India, which has also affected ATM network and Government offices computers too.The CERT issued a severe threat alert on Saturday and also advised to the users not to open any unknown emails from an unknown sender as it is estimated that an approx. of 23 million emails, messages are sent in the phishing campaign.The studies estimate more than 100 countries in the world have ... Read More

165 Views
The recent ransomware attack has changed the definition of centuries-old style of demanding ransom. Typically what we know earlier that, the bad guys kidnapped a person or an item and held captive to extort money or property to secure their release. That is the typical way of demanding ransom which we sometimes found in our national and international newspapers as well as in many Hollywood and Bollywood movies where similar stories are kept on playing.But, most of us may not ever thought of those files and folders on your desktops, laptops, and smartphones which can be locked and hold for ... Read More

2K+ Views
In this article we will learn about – how to configure and setup UFW ( Firewall) on Ubuntu 16.04, UFW stands for Uncomplicated Firewall which acts as an interface to IPTABLES that simplifies the process of the configuration of firewalls it will be a very hard for a beginners to learns and configure the firewall rules where we will secure the network from unknown users are machines. UFW works on the policies we configure as rules.Pre-requisitesFor this, we needed a non-root user with root permission on the machine.Installing the UFW (Firewall)UFW is installed by default with Ubuntu, if not installed ... Read More

387 Views
Iptables and ip6tables are used to established, maintain, and check up on the tables of IPv4 and IPv6 packet filter ideas in the Linux kernel. Several distinct tables may be defined. Each table contains a quantity of constructed-in chains and may also contain person-outlined chains. Let us explore about how to manage a system firewall using Iptables in Linux.Installing IP tablesTo install IP tables, use the following command –$sudo apt-get install iptablesThe sample output should be like this –Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: ... Read More

139 Views
Spyware is an unwanted program that gets installed in user’s system without his/her permission and tracks all the activities like important log-in information, valuable data, internet interactions etc. In addition to that, it hampers the performance of systems and even redirects web browser searches.Its rank on vulnerability is high because detection is very difficult. Before some spyware will be installed on your system, you have to open or click on some programs. The usual sources of these are spam folders of your mail, free downloaded software, misleading pop-ups and corrupt websites. Unless you are not sharp enough to judge these ... Read More

207 Views
With seven hundred million plus users all over the globe, Facebook is a perfect podium for scam artists. For a scammer, it requires little research on your interest, one simple friend request and once you add them in your friend list, the further process of phishing and scamming runs smoothly.This mega program runs through ‘Social Engineering’, which means understanding common user habit along with behavior and make best use of those to design eye-catching headlines. A simple click on them can redirect you safely to unsafe scam page. There you might be asked to input your login details and personal ... Read More

736 Views
WhatsApp has emerged as a popular smart app and is even more admired due to its secured chatting feature. With different versions, it offers users an additional security level each time, thus ensuring the safe messaging experience, but the updated version of WhatsApp post 31st march 2016 brought a revolutionary change by introducing a strong security feature for its users known as “end-to-end encryption”, designed on Open Whisper System. This has added another layer of safety to its application and has made more well-liked.What is End-to-end Encryption?End to end encryption means no one except you and the recipient can see ... Read More

539 Views
In this article, we will learn about how to setup and configure the Apache Web server to restrict from visitors without authentication where we can hide some important and critical information to the un-authenticated users.PrerequisitesWe needed an Ubuntu machine with a non-root user with Sudo privileges.An Apache2 web server installed on the machine.Installing the Apache UtilitiesWe needed to install an Apache2 utility package called ‘htpasswd’ where this utility is a part of ‘apache2-utils’ packages.This will help us to create and manage the username and password which is needed to access the restricted part of the website.Below is the command to ... Read More

232 Views
In this super busy world of professional environment, it makes it challenging for each one of us to organize and use our emails effectively and efficiently. Whether it’s customizing, sorting, searching, automating your emails, Gmail offers dozens of ways to managing your inbox easily. Gmail is simple enough to use and to make you become a Gmail power user. We bring you some tips which will help you get to the next level of productivity.Labeling your EmailsLabeling your emails makes it easy and effective in organizing your inbox. Emails can be automatically given a label and you can also create ... Read More