
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 987 Articles for Safe & Security

539 Views
Digital Signature is a mathematical technique which is used to authenticate a digital document. This is equivalent to handwritten signature or a stamped seal and offers far more security and integrity to the message or digital document. It solves the problem of impersonation in digital communications by providing evidence of origin, identity and status of the digital transactions. Many countries like the United States of America consider digital signatures as legal. They even publish public laws, private laws and the Budget with digital signatures.How does a Digital Signature Work?Digital signatures are based on asymmetric cryptography, which means that the information ... Read More

511 Views
Cybercrime is the crime that is done using the internet and a computer or a phone or any other device as an instrument to cheat people, commit frauds, stealing intellectual property, violating privacy, stealing identities and diverting monetary transactions through the internet, female and child trafficking in pornography etc. Cybercrime has been very prevalent in the world today that almost everyone in the world is directly or indirectly affected by this. As the computer has become the gateway to the trade, banking, governance etc. Cybercrime is increasing by leaps and bounds.There are different types of Cybercrime that can be enlisted ... Read More

128 Views
Proper security involves all-around surveillance or observation of people, their behavior and actions, immovable property like land and building as well as movable property stationed there. Surveillance is generally conducted with the help of methods that either have limited mobility or are stationary like, CCTV cameras, GPS tracking dependent on satellite connectivity and not helpful in close observation, stake-outs, which are time-consuming, data-based profiling and biometrics and some other methods.Drone Has Turned the TableAll these methods have their own level of advantages and limitations but when it comes to drone technology, the efficiency, and effectiveness of any security operation increase ... Read More

109 Views
The IB (Intelligence Bureau) which is the premier intelligence services department of the Government of India has identified a number of mobile apps including many that are developed by Chinese companies. Here's a list of 28 apps that the Digital IT Cell of the Government of India has identified as spyware and malware - Weibo, Wechat, Shareit, Truecaller, UC News, UC Browser, Beautiplus, Newsdog, Viva Video - Qu Video Inc, Parallel Space, Apus Browser, Perfect Corp, Virus Cleaner - Hi Security Lab, CM Browser, MI Community, DU Recorder, Vault Hide - NQ Mobile Security, Youcam Makeup, MI Store, Cachecleaner DU ... Read More

198 Views
Women in today’s world are taking major positions in different sectors and are performing extraordinarily well in their work roles. The contribution of women is extremely crucial for the inclusive economic development of the country. The principle of Gender Equality is enshrined in our constitution and the feminist movement in the late 1970s strengthened the concept. If we want women to succeed in their work lives, it is important to create a safe atmosphere for a woman to give a holistic contribution. Let's know how:Infrastructure FacilitiesIt is extremely important to keep the infrastructure facilities extremely strong in any workplace. Proper ... Read More

342 Views
God helps those who help themselves. While, it is a moral duty of each and every individual to lend a helping hand to others, there are many instances where we have to help our own selves and these are mostly concerned with our safety and protection. Women today are becoming more and more vulnerable to security issues, which is actually a serious problem in our country.It’s time again that women free themselves from the clutches of bondage and become the harbinger of power (Shakti) who has worshiped a Durga in this country yet women live under constant fear and threat. ... Read More

53K+ Views
The data that a user enters into multiple pages of a website can be saved using a combination of cookies and sessions. Cookies and sessions are both vitally important since they record the data that the user has provided for a variety of purposes.Cookies and Sessions are used to store information. Cookies are only stored on the client-side machine, while sessions get stored on the client as well as the server.Read through this article to find out more about cookies and sessions and how they are different from each other.What is a Cookie?Cookies are little text-based files that are kept ... Read More