
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Kanal S Sajan has Published 171 Articles

Kanal S Sajan
549 Views
In the context of mobile devices, jailbreaking refers to exploiting an exploit to bypass manufacturer or carrier constraints on a device such as an iPhone or iPad. The exploit usually entails performing a privilege escalation attack on a user's device to install a modified kernel instead of the manufacturer's factory-installed ... Read More

Kanal S Sajan
415 Views
We reveal a great deal about ourselves since we live our lives online. Personal information, photographs, and geotags tell the world who you are and where you are on your favorite websites and social media networks. Your digital footprints are visible all across the web. You may become a victim ... Read More

Kanal S Sajan
7K+ Views
The practice of categorizing raw datasets into patterns based on trends or abnormalities is known as data mining. Companies utilize a variety of data mining methods and tactics to gather information for data analytics and deeper business insights.For modern firms, data is the most valuable asset. Extracting important data from ... Read More

Kanal S Sajan
867 Views
Data MaskingTo secure sensitive data, data masking is the technique of modifying some data components within data storage so that the structure remains similar, but the information is changed. Data masking ensures that sensitive client data is not accessible outside the allowed production environment. This is particularly frequent in settings ... Read More

Kanal S Sajan
524 Views
The steps that computers and other devices can take to improve their online security and maintain system health are referred to as cyber hygiene. Adopting a security-centric mindset and behaviors that help individuals and organizations avoid potential internet intrusions is called cyber hygiene. One of the most key parts of ... Read More

Kanal S Sajan
331 Views
CryptoLocker is a ransomware Trojan that supposedly encrypts files on a victim's computer and demands a fee to retrieve the data. It originally appeared on the Internet in 2013 and was designed to infect PCs running Windows. Infected email attachments or a botnet propagates CryptoLocker. It looks for particular file ... Read More

Kanal S Sajan
328 Views
What is Clickjacking Vulnerability, and how does it affect you?"UI redressing" is a subcategory of "clickjacking." Clickjacking is a harmful practice that involves tricking a web user into engaging with something other than what he expects to deal with. In most circumstances, a clickjacking attack is carried out simply by ... Read More

Kanal S Sajan
260 Views
Botnets are harmful programs that are run by a botmaster or botherder, who is a malevolent programmer. Botherder infects the weak user's machine with a virus or viruses, the payload of which is a malicious program. It establishes contact with the command and control server and establishes a connection with ... Read More

Kanal S Sajan
1K+ Views
An assault against Bluetooth-enabled devices such as smartphones, laptops, and smartwatches is known as bluejacking. Sending unwanted messages to neighboring targets inside the Bluetooth range is a common strategy. Bluejacking may appear vexing at first, but it is ultimately harmless. Attackers, on the other hand, might send harmful material, links, ... Read More

Kanal S Sajan
963 Views
Malware is an ever-evolving threat to individuals, institutions, and governments in the age of increased mobile and smart connectivity. Anti-malware companies are frequently a mobile user's first and only line of protection. Because of the financial incentives, the number and complexity of Android malware are growing, making it more difficult ... Read More