
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Pranav Bhardwaj has Published 429 Articles

Pranav Bhardwaj
381 Views
The US Federal Bureau of Investigation defines "cyberterrorism" as a deliberate attack on a computer system, computer data, programs, or other material with the express purpose of inflicting violence on clandestine operatives and subnational groups.Cyberterrorism is defined as the use of computer technology to commit acts of terrorism. We must ... Read More

Pranav Bhardwaj
335 Views
Cyber-attackers utilize a Domain Generation Algorithm (DGA) to generate new domain names and IP addresses for malware's command and control servers. It is practically hard for security professionals to detect and limit the attack since it is carried out in a seemingly random manner."Conficker A and B", a family of ... Read More

Pranav Bhardwaj
221 Views
Stuxnet is a computer worm that was created to attack Iran's nuclear facilities but has since mutated and spread to other industrial and energy-generating facilities.The original Stuxnet malware attack was aimed at PLCs, which are used to automate machine processes. It was the first known virus capable of crippling hardware ... Read More

Pranav Bhardwaj
342 Views
Parameter Tampering is a straightforward assault against an application's business logic. This attack takes advantage of how a lot of programmers use hidden or fixed fields as the only security protection for specific actions (such as a hidden tag in a form or a parameter in a URL). Attackers can ... Read More

Pranav Bhardwaj
447 Views
In general, privacy refers to the right to be left alone and the freedom from interruption or intrusion. The right to control how your personal information is gathered and utilized is known as information privacy.The concept of responsible use and protection of information falls under the domain of privacy, which ... Read More

Pranav Bhardwaj
317 Views
A BIOS (Basic Input Output System) is a program that allows a computer's microprocessor to start the computer when you switch it on. It also controls data flow between the operating system of the computer and associated devices such as the hard disc, video adapter, keyboard, mouse, and printer.Similarly, files ... Read More

Pranav Bhardwaj
326 Views
What is Spoofing?Spoofing is a type of online assault in which cyber attackers alter the address or source of a packet to make it appear as if it came from a trustworthy source. Enterprises set up routers, firewalls, and gateways to identify fake or spoofed packets. These devices are responsible ... Read More

Pranav Bhardwaj
410 Views
SOAR (Security Orchestration, Automation, and Response) is a set of related software applications that allows a company to collect data on security risks and respond to security events without human intervention. An organization's incident analysis and response processes can be defined using SOAR technologies in a digital workflow format.The automatic ... Read More

Pranav Bhardwaj
516 Views
As data travels to the cloud, meetings migrate online, or acquire online components, some of which are likely to continue in the future, cybersecurity becomes increasingly critical.Privacy is a major factor in cybersecurity. Consumer decisions are influenced by privacy problems; a good reputation can attract consumers, while a data breach ... Read More

Pranav Bhardwaj
13K+ Views
What is RC4?RC4 stands for Rivest Cipher 4. Ron Rivest invented RC4 in 1987, and it is a stream cipher. Because RC4 is a stream cipher, it encrypts data bytes by bits. Because of its speed and simplicity, RC4 is the most extensively used stream cipher of all the stream ... Read More