- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 47 Articles for Web Security

Updated on 06-Feb-2023 20:38:58
Overview DNS records (short for "Domain Name System records") are types of data that are stored in the DNS database and used to specify information about a domain, such as its IP address and the servers that handle its email. There are several different types of DNS records, including A records, MX records, CNAME records, and others, each with its own specific purpose. A record (short for "address record") maps a domain or subdomain to an IP address. For example, the domain "example.com" might have an A record that maps it to the IP address "192.0.2.1". When someone types "example.com" ... Read More 
Updated on 16-Jan-2023 17:48:47
Central Authentication Service (CAS) is an open-source platform that provides single sign-on (SSO) authentication for web applications and services. This means that users can log in once and gain access to multiple applications and services without having to provide their credentials multiple times. CAS is widely used in educational institutions and other organizations to simplify the process of accessing web-based resources. Overview of CAS CAS is based on the SAML specification and provides a centralized way to authenticate users. It is composed of two main components: the CAS server and the CAS client. The CAS server is responsible for authenticating ... Read More 
Updated on 17-Aug-2021 07:09:09
VPN stands for a Virtual Private Network. As the name suggests, it hides the user’s IP address, blocks their location, and even removes their browser history, allowing them to share and receive sensitive data on the public network more privately.VPN is useful while sharing something sensitive because when you share something on the Internet or you search about something on a web browser, you leave your digital footprints behind in the form of browsing history and cached data. Due to these digital footprints, anyone can track you and what you are searching. But you should also be aware that your ... Read More 
Updated on 17-Aug-2021 07:07:24
These days, all of us use the Internet and the more the number of users, the more the ways to get internet. Some of us use the internet through a 4G connection, which people have in their smartphones, and some use the internet through WiFi hotspots, which may be public or private. To understand which is safer, let’s see some basic facts.Types of WiFi NetworksWiFi networks are of two types, public and private.Private networks are the ones whose routers are installed at our house or office and are purchased from ISP. Private networks provide you highest speed that you require, ... Read More 
Updated on 17-Aug-2021 07:05:46
As people are getting more awareness about the Internet these days, little, they know how to use it more securely and what are all the risks they are taking on every suspicious click they make. Many times, paid applications are available freely on some third-party app store, and people often try to download those applications from there, but those come with a lot of risks that you might be unaware of.Third-party App Stores offer cyberattackers an avenue through which they deliver their infected malicious apps to users unaware of these risks. Hence, it is always advised that before you download ... Read More 
Updated on 17-Aug-2021 07:04:03
Most of the time, when we suddenly see a pop-up demanding an update, we tend to select the option of scheduling them later. In this article, we will see why those software updates are important, and what if we don't keep our system and its apps up-to-date?Realizing that you were hacked because you ignored the update pop-up on your system while you were working would be very hard to digest. Updating all the software, specifically the anti-virus and anti-malware programs, minimizes the chances of any loopholes in the program's security, ensuring that viruses, malware, and remote "hackers" stay out of ... Read More 
Updated on 17-Aug-2021 07:03:01
If someone steals your wallet, they will only be able to get money; but if someone hacks your system, your whole life with what you do and where you go will be in front of him. So, yes, cyber threats are real things and can be extremely dangerous. As most of the people these days store all their information online, it becomes crucial to know how you can recognize and protect yourself from cybercrimes.How to Recognize a Cybercrime?Identity theft is the illegal use of someone else's personal information to obtain money or credit without informing that person. And it is ... Read More 
Updated on 17-Aug-2021 07:00:33
How many of you go to your friend's houses to give them the files they need? I guess 1 out of 1000 and that too if that friend lives nearby. Most of us these days don't share any file, be it documents/pictures, in physical form. We transfer them through the Internet or Bluetooth or WiFi. While some of these files may be harmless if leaked by mistake, others may be confidential. So, rather than sharing important files carelessly, it is wise to choose a secure way to transfer the files to avoid risks.Ways to Share Files SecurelyThere are various ways ... Read More 
Updated on 17-Aug-2021 06:58:11
Cyberbullying is a kind of bullying that occurs online through devices and systems. It can happen via emails, text messages, phone calls, social media apps, or some websites. It includes humiliating someone or causing them embarrassment by sharing something private about them which no one else knows through one of the online platforms. Cyberbullying is also considered one of the crimes that have a law against it in our constitution.We all know that popular social media apps don’t provide security when it comes to the photos or videos we are posting, and any stranger can easily see all the comments ... Read More 
Updated on 17-Aug-2021 06:56:22
One of the studies held at the Stanford University found that, yes, Android phones can be tracked even when their GPS and WiFi are not enabled by analyzing their power-use over time. It works on a simple rule that “A cellphone uses more power, the more away it is from the cell tower and the more obstacles are on its way to reach for a signal.” Along with this, all the other activities which use power can be factored out with the help of the algorithm the researchers studied.The term which they used to track you through your power consumption ... Read More Advertisements