Found 1009 Articles for Safe & Security

What are the differences between SecureSafe and Ubuntu One?

Bhanu Priya
Updated on 21-Mar-2022 05:45:37

101 Views

Let us understand the concepts of SecureSafe and Ubuntu One before learning the differences between them.SecureSafeSecureSafe was launched by DSwiss AG in the year 2009 and is one of the file hosting services and cloud storage. It also provides password safe, document storage and digital spaces for online collaboration. It is based on the basis of principles of security by design and privacy by design. It offers 100 MB storage space for free and for paid users, it offers 100 GB storage space.FeaturesThe features of SecureSafe are as follows −Password managerFile storage2-factor authenticationData roomsData inheritanceUbuntu OneIt provides a collection of ... Read More

What are the differences between SSL and SSH?

Bhanu Priya
Updated on 17-Mar-2022 10:59:57

293 Views

Let us understand the concepts of Secure Sockets Layer (SSL) and Secure Shell (SSH) before learning the differences between them.Secure Sockets Layer (SSL)It's an encryption-based Internet security technology. It was designed to protect data integrity, privacy, and authentication in Internet communications. SSL was the precursor of the TLS encryption protocol that we use today. A website that employs SSL/TLS has "HTTPS" in its URL instead of "HTTP."Two services are provided by SSL Records for SSL connections i.e. Confidentiality and Message integrity Data is fragmented in the SSL Record Protocol application. The fragment is compressed before being added with an encrypted ... Read More

What are the differences between Google Drive and MiMedia?

Bhanu Priya
Updated on 17-Mar-2022 10:36:19

124 Views

Let us understand the concepts of Google Drive and MiMedia before learning the differences between them.Google DriveIt is a file storage and synchronization service developed by Google in the year 2012. It allows users to store files, share files and synchronize files on different devices. In order to access and use a Google drive account, you would need to set up a G-mail account.Once you've set up your Google account, you can access Google Drive by going to http://drive.Google.com in your web browser.FeaturesThe features of Google Drive are as follows −Sync Your All FilesSave to Google DriveSave Gmail AttachmentsWork OfflineConvert ... Read More

What are the differences between Endpoint Security and Antivirus Software?

Bhanu Priya
Updated on 17-Mar-2022 07:03:42

209 Views

Let us understand the concepts of antivirus software and endpoint security.Antivirus softwareIt is developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers etc. It is a program, mainly performs functions like to scan, detect and remove viruses from your computer.Examples &mius; Windows Defender, AVG, AVAST, McAfee. Kaspersky etc.Features of an Effective AntivirusThe features of an effective antivirus are as follows −Default-Deny ProtectionAuto Sandbox TechnologyContainment TechnologyHost Intrusion Protection System (HIPS)AdvantagesThe advantages of an effective antivirus are as follows −Virus protectionWeb ProtectionSpam protectionCost effectiveFirewall featureDisadvantagesThe disadvantages of an effective antivirus are as follows −System slowdownSecurity holesMore advertisementsNo ... Read More

What are the differences between Antivirus and Antispyware?

Bhanu Priya
Updated on 17-Mar-2022 07:00:55

1K+ Views

Let us understand the concepts of antivirus software and antispyware.Antivirus softwareIt is a program which is designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs mainly perform the function like to scan, detect and remove viruses from your computer.The different versions present in market are as follows −Windows DefenderAVGAVASTMcAfeeKasperskyThe virus is stored in a distinct vicinity referred to as a vault in which it has a different file machine due to which virus impacts it. Users can themselves coach antivirus to delete computer virus, put it in a vault ... Read More

How to create a Phishing page of a website?

Bhanu Priya
Updated on 17-Mar-2022 06:29:14

5K+ Views

Phishing is a type of social engineering attack which is often used to steal user data, including login credentials and credit card numbers and sensitive information without their knowledge that it is being extracted from them.The goal of a phishing attempt is to trick the recipient into taking the attacker’s desired action, such as providing login credentials or other sensitive information.Phishing TechniquesThere are different types of phishing techniques which are as follows −Deceptive PhishingA phisher sends bulk email with a message. Users are influenced to click on a link. These emails are broadcast to a wide group of recipients with ... Read More

What are the critiques of OSI Model and Protocols?

Bhanu Priya
Updated on 17-Mar-2022 06:10:41

1K+ Views

Let us see the detailed analysis and assessment of OSI and TCP/IP protocols.TCP/IPIt is a suite of communication protocols which is used to interconnect network devices on the internet. The Transmission Control Protocol/Internet Protocol (TCP/IP) is also used as a communication protocol in a private network.The entire internet protocol suite is a set of rules and procedures by providing end-to-end communications which identify how it should be broken into packets addressed, transmitted, routed and received at the destination.It is defined to make networks reliable, with the ability to recover automatically from the failure of any device on the network.History of ... Read More

What are the differences between DCS Network and Field Communication Protocol?

Bhanu Priya
Updated on 17-Mar-2022 05:45:33

257 Views

Let us begin by understanding the concepts of DCS Network Communication Protocol and the Field Communication Protocol.DCS Network Communication ProtocolGenerally, a system convention characterizes principles and traditions for correspondence between arranging gadgets. It incorporates components for gadgets to recognize and make associations with each other, and in addition designing standards that determine how information is bundled into messages sent and received. A few conventions likewise bolster message affirmation and information pressure intended for dependable and additionally superior system correspondence.Current conventions for PC organizing all by and large utilize parcel changing systems to send and get messages as bundles - messages ... Read More

What are the Network protocol requirements in the communication process?

Bhanu Priya
Updated on 17-Mar-2022 05:43:18

2K+ Views

Network communication is nothing but a conversation between two persons. Let us consider a real life situation, for two people to communicate effectively, the first and foremost requirement is language.If they both do not know a common language communication is simply not possible. They will first say 'Hi', 'How are you' etc and do a handshake.Similar to this, in computer communication, for two computers to effectively communicate we need the following −Set of procedures for handshakingSet of rules for interpreting the data sentSteps for recovery if communication is broken in the middle.Network protocols are a set of standards which facilitate ... Read More

What are the threats on the Internet?

Bhanu Priya
Updated on 17-Mar-2022 05:41:14

1K+ Views

Internet-based threats are Malware programs which can be targeted when we use the Internet. These Web-based threats include a range of malicious software programs which are designed to infect victims' computers.Major Threats on InternetSome of the major threats on internet are as follows −SpamGenerally we received a lot of Emails with' spam ' or Junk folder insinuates that spam emails are huge issues, with more than Half of the emails being siphoned into these folders. Being an annoyance, spam emails are not a direct threat but they contain malware.TrojanTrojan represents harmless computer programmes. So we don't detect them and that's ... Read More

Advertisements