- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1009 Articles for Safe & Security
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
178 Views
Deleting a file or formatting a hard disc does not result in the data being removed from your hard drive. The problem arises when you delete a file, it goes to the recycling bin, and when you empty the recycle bin or press the shift + delete keys, you're actually removing the path to the files, not the files themselves. Formatting, on the other hand, does not destroy data; it just eliminates the present file system and defines or sets up a new one. However, the data on the hard disc is still intact.To put it another way, formatting the ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
116 Views
What is a Smart Home?A smart home is an interesting house setting where appliances and equipment may be managed remotely using a mobile or other networked device from anywhere with an internet connection. A smart home's devices are connected through the internet, allowing the user to handle features such as home security, temperature, lighting, and a home theatre from afar.How Does a Smart Home Work?The electronics in a smart home are all networked and may be controlled from one central location—a smartphone, tablet, laptop, or gaming console. One home automation system can operate door locks, televisions, thermostats, home monitors, cameras, ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
204 Views
Networking devices are prone to intrusion even if we are not aware of the possible threats to us. Most of us think that such a scenario won't happen to ordinary people in their homes. The idea of network security is so clouded in doubt that most of us won't even bother to use it. In this article, we will take a look at the possible ways that you can use to keep your home Wi-Fi safe.While connecting a wireless device to your wireless network may appear to be a headache at times, but you should take the required procedures to ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
115 Views
Every scam has its own characteristics, yet they always have a few basic aims and, in certain cases, tactics. You'll need to be prepared because new sorts of fraud emerge on a regular basis. To avoid falling victim to these mobile frauds, pay attention to what they're asking you to do. However, some frauds aren't always visible, so staying on top of emerging scams is critical. This is because recovering your accounts after they've been hacked might be difficult.What Are Phone Scams and How Do You Avoid Them?Mobile phones are becoming among our most valuable possessions, and cybercriminals are well ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
358 Views
What Does Password Mean?A password, in general, is an arbitrary string of characters that may include letters, digits, or other symbols. If the permitted characters are limited to numbers, the corresponding secret is sometimes referred to as a personal identification number (PIN).Contrary to its name, a password does not have to be a word; in fact, a non-word (in the dictionary sense) may be more difficult to guess, which is a desirable property of passwords. A pass is a memorized secret consisting of a sequence of words or other text separated by spaces. In terms of usage, a passcode is ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
386 Views
With each passing day, we are becoming more dependent on technology, leading to the number of cybercriminals. They try to find a way to get into your device each day to attack and utilize the loopholes, and your voicemail platform is one area that is infamously vulnerable to hackers.How a Voicemail Gets Hacked?A four-digit passcode protects the majority of voicemail accounts. Because voicemail is usually accessed using a phone, the passcode can only be made up of numbers. Brute-force attacks against the four-digit personal identification numbers (PINs) that safeguard voicemail systems are vulnerable to compromise. To get in and access ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
174 Views
What is Hacking?Acts intended at exploiting digital devices such as computers, cellphones, tablets, and even entire networks are referred to as hacking.While hacking isn't always for malicious purposes, most references to it (and hackers) nowadays define it (and them) as illicit cybercriminal behaviour motivated by monetary gain, protest, information collecting (spying), or even just for the "fun" of it.How Hacking Works?Hacking is usually technical in nature. However, hackers can utilise psychology to persuade a user to open a harmful file or provide sensitive information. "Social engineering" is the term for these techniques. Besides social engineering and malvertising, common hacking techniques ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
402 Views
The worldwide video game business is prospering despite the economic upheaval created by the coronavirus. Individuals are resorting to virtual worlds for escapism from the crisis as social alienation reduces physical connection to a minimum and encourages people to stay at home. In March, video game sales in the United States reached their highest level in almost a decade, and gaming industry behemoths have all reported a significant growth in user numbers.Online Gaming Safety TipsFor any purchases relating to the game, only utilise the official websites. Clicking on links that take you to third-party websites is not a good idea.Don't ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
351 Views
In our daily lives, we use many physical measurements to identify the people around us, be it the sound of a person, his fingerprint, or anything. It is a unique character that allows us to identify the person. The science of identifying a person using these physical and behavioral measurements and analyses is called Biometrics.Let us now see more on Biometrics and how it works.What is Biometrics?From unlocking our smartphones to unlocking our bank locker, Biometrics plays a vital role in our lives as it is a much more secure way than other methods of access control such as keys, ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
94 Views
The practice of defending oneself from being tricked into online scams is known as online fraud protection.Online users can protect themselves from hazardous malware or hacking efforts to obtain personal information that cybercriminals use for their financial benefit by educating themselves and downloading reliable and up-to-date anti-virus software. Nowadays, as more fraudulent activities occur, many anti-fraud protection services are also being developed, discussed below.What are Credit Monitoring Services?Credit monitoring is a service that studies and monitors your credit reports at all times. They even monitor your credit scores, detect any unusual activity, and report it as soon as it is ... Read More