Found 60 Articles for Security

What is Time-To-Live (TTL)?

Pranavnath
Updated on 12-Apr-2023 16:01:54

772 Views

Time to Live (TTL) is a term used in computer science to describe how long a network packet will contain data. It is a value inside the packet header that represents the most router hops a packet may make before being dropped. When a packet travels through a network, it is forwarded from one router to another until it arrives at its final destination. The packet header's TTL value decreases with each router it passes through. The packet is dropped and not transmitted any further when the TTL is 0, halting its endless circulation. Time to Live (TTL) The TTL ... Read More

Types of VoIP hacking and counter measures

Pranavnath
Updated on 12-Apr-2023 15:52:06

409 Views

Voice over internet protocol is related to the collection of different technology that allows the easy and effective delivery of voice communication, video, audio, and images with the help of the data network through internet protocol. It can also be referred to as a technology that makes it very easier to make voice calls by making use of Internet connections. VoIP makes it very easier and more flexible to make calls as compared to the traditional telephone system. To reduce voice over Internet protocol hacking it is important to incorporate various measures that could include designing a strong password ... Read More

Implementing Salting

sudhir sharma
Updated on 12-Apr-2023 14:49:24

537 Views

Introduction In today's digital world, protecting user data is of utmost importance, and one essential aspect of this protection lies in securing passwords. Implementing salting is a powerful technique used to strengthen password security by adding an extra layer of complexity to the hashing process. Understanding salting and its importance in password security Salting is a crucial security measure that involves adding unique and random strings of characters to passwords before they are hashed, protecting against password collisions and preventing dictionary or rainbow table attacks. Definition of Salting Salting, in the context of password security, refers to the process of ... Read More

Data Security in Computer Network

Pranavnath
Updated on 11-Apr-2023 17:22:50

1K+ Views

Data security is the procedure to secure digital information from unauthorized access, theft, or corruption. The Data security is adhere to CIA Triad functioning i.e Confidentiality, Integrity, and Availability. Confidentiality is proper authorization by the legitimate user. Integrity is robust and unchangeable to attain accurate, reliable data. Availability is access to data safely from anywhere. Data security requires some specific controls, procedures, and standard policies to avoid unethical access, loss, or destruction. Data security is important as all working with data need to take measures properly, on time and seriously to avoid data breaches which in the future can help ... Read More

Wide-Mouth Frog

Pranavnath
Updated on 11-Apr-2023 17:11:35

229 Views

In computer science, a wide-mouth frog alludes to a sort of security danger where a noxious performing artist picks up unauthorized get to arrange by posturing as a trusted substance. This sort of assault is additionally known as "pantomime assault." The term "wide-mouth frog" comes from the thought that the aggressor can "open its mouth wide" and pick up get touchy information. In this article, we are going investigate the effect, focal points, impediments, and requirements for security against wide-mouth frog assaults. The Wide - Mouth Frog? The "Wide-Mouth Frog" may be a term commonly utilized in computer science to ... Read More

WhatsApp Alternatives

Shirjeel Yunus
Updated on 11-Apr-2023 15:24:07

295 Views

What is WhatsApp? WhatsApp is a free messenger which can be downloaded on smartphones Many people use WhatsApp to send text messages, videos, audio, important documents, and many others. WhatsApp can also be used on PCs and laptops through WhatsApp web. Facebook is the owner of WhatsApp and currently, there are more than 1 billion users of this app. Cost of WhatsApp WhatsApp can be used free of cost. But charges are applied for a business account. The charges depend on who initiated the message. No charges are incurred if a customer starts messaging. But if the messaging is started ... Read More

Trusted Systems in Network Security

Pranavnath
Updated on 28-Mar-2023 17:24:16

3K+ Views

The term “Trusted system” means that it provides the user with an assurance that no malicious or harmful software affects the computer system. Network Security plays a vital role in many organizations, to keep the data safe and secure from being attacked by cyberattacks or malware. Now Companies are using cloud storage, Wireless network, and remote application, so the challenges in protecting them are also increased. Here the Trusted systems provide Multi-layered security (MLS) for securing the networks. The trusted applications will not allow any changes in the policy. In this article, the models of network security to have trusted ... Read More

Trojan horse and Trap Door

Pranavnath
Updated on 28-Mar-2023 17:12:31

2K+ Views

A threat is designed by hijackers to change the behavior of the process. The threat can reach the system through any path to our system or any organization sever. When the attack happens, it leads to the corruption of data, the stealing of personal information, and the loss of data. The Trojan horse and trap door are some of the program threats which need to be avoided for the proper functioning of the system. So it is a great deal to protect the system from program threats. The protection of files and other resources from misusing the data is important. ... Read More

Top 10 Common Security Log Sources

Pranavnath
Updated on 28-Mar-2023 17:07:24

812 Views

In this article, we will see the top 10 common security log sources that are being developed and used by companies. Log Sources are a type of data source that creates an event log in an organization. The log is nothing but the records with data. An event log is a tool that has software and hardware-related information. When any security threat occurs, these logs help the security specialists to use this information in the event logs for security management. Event logs are generated in a computer system that has the stuff for identifying the bugs, risks, or threats. Every ... Read More

Gmail Alternatives

Shirjeel Yunus
Updated on 28-Mar-2023 11:32:09

407 Views

What is Gmail? Gmail is a free email service from Google which you can use to send emails to one or more persons. The service provides storage of 15 GB. You will also have the option to search for a particular email. The tool has many categories like Inbox, Started, Sent, etc. and you can make a search in any of them. You can access Gmail from different electronic devices like desktops, laptops, tablets, mobiles, etc. Cost of Gmail Gmail is a free service from Google for general users. If you want a business account, you have to make payments ... Read More

Advertisements