- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 60 Articles for Security
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
772 Views
Time to Live (TTL) is a term used in computer science to describe how long a network packet will contain data. It is a value inside the packet header that represents the most router hops a packet may make before being dropped. When a packet travels through a network, it is forwarded from one router to another until it arrives at its final destination. The packet header's TTL value decreases with each router it passes through. The packet is dropped and not transmitted any further when the TTL is 0, halting its endless circulation. Time to Live (TTL) The TTL ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
409 Views
Voice over internet protocol is related to the collection of different technology that allows the easy and effective delivery of voice communication, video, audio, and images with the help of the data network through internet protocol. It can also be referred to as a technology that makes it very easier to make voice calls by making use of Internet connections. VoIP makes it very easier and more flexible to make calls as compared to the traditional telephone system. To reduce voice over Internet protocol hacking it is important to incorporate various measures that could include designing a strong password ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
537 Views
Introduction In today's digital world, protecting user data is of utmost importance, and one essential aspect of this protection lies in securing passwords. Implementing salting is a powerful technique used to strengthen password security by adding an extra layer of complexity to the hashing process. Understanding salting and its importance in password security Salting is a crucial security measure that involves adding unique and random strings of characters to passwords before they are hashed, protecting against password collisions and preventing dictionary or rainbow table attacks. Definition of Salting Salting, in the context of password security, refers to the process of ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
1K+ Views
Data security is the procedure to secure digital information from unauthorized access, theft, or corruption. The Data security is adhere to CIA Triad functioning i.e Confidentiality, Integrity, and Availability. Confidentiality is proper authorization by the legitimate user. Integrity is robust and unchangeable to attain accurate, reliable data. Availability is access to data safely from anywhere. Data security requires some specific controls, procedures, and standard policies to avoid unethical access, loss, or destruction. Data security is important as all working with data need to take measures properly, on time and seriously to avoid data breaches which in the future can help ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
229 Views
In computer science, a wide-mouth frog alludes to a sort of security danger where a noxious performing artist picks up unauthorized get to arrange by posturing as a trusted substance. This sort of assault is additionally known as "pantomime assault." The term "wide-mouth frog" comes from the thought that the aggressor can "open its mouth wide" and pick up get touchy information. In this article, we are going investigate the effect, focal points, impediments, and requirements for security against wide-mouth frog assaults. The Wide - Mouth Frog? The "Wide-Mouth Frog" may be a term commonly utilized in computer science to ... Read More
![Shirjeel Yunus](https://www.tutorialspoint.com/assets/profiles/612930/profile/60_285618-1678179898.jpg)
295 Views
What is WhatsApp? WhatsApp is a free messenger which can be downloaded on smartphones Many people use WhatsApp to send text messages, videos, audio, important documents, and many others. WhatsApp can also be used on PCs and laptops through WhatsApp web. Facebook is the owner of WhatsApp and currently, there are more than 1 billion users of this app. Cost of WhatsApp WhatsApp can be used free of cost. But charges are applied for a business account. The charges depend on who initiated the message. No charges are incurred if a customer starts messaging. But if the messaging is started ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
3K+ Views
The term “Trusted system” means that it provides the user with an assurance that no malicious or harmful software affects the computer system. Network Security plays a vital role in many organizations, to keep the data safe and secure from being attacked by cyberattacks or malware. Now Companies are using cloud storage, Wireless network, and remote application, so the challenges in protecting them are also increased. Here the Trusted systems provide Multi-layered security (MLS) for securing the networks. The trusted applications will not allow any changes in the policy. In this article, the models of network security to have trusted ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
2K+ Views
A threat is designed by hijackers to change the behavior of the process. The threat can reach the system through any path to our system or any organization sever. When the attack happens, it leads to the corruption of data, the stealing of personal information, and the loss of data. The Trojan horse and trap door are some of the program threats which need to be avoided for the proper functioning of the system. So it is a great deal to protect the system from program threats. The protection of files and other resources from misusing the data is important. ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
812 Views
In this article, we will see the top 10 common security log sources that are being developed and used by companies. Log Sources are a type of data source that creates an event log in an organization. The log is nothing but the records with data. An event log is a tool that has software and hardware-related information. When any security threat occurs, these logs help the security specialists to use this information in the event logs for security management. Event logs are generated in a computer system that has the stuff for identifying the bugs, risks, or threats. Every ... Read More
![Shirjeel Yunus](https://www.tutorialspoint.com/assets/profiles/612930/profile/60_285618-1678179898.jpg)
407 Views
What is Gmail? Gmail is a free email service from Google which you can use to send emails to one or more persons. The service provides storage of 15 GB. You will also have the option to search for a particular email. The tool has many categories like Inbox, Started, Sent, etc. and you can make a search in any of them. You can access Gmail from different electronic devices like desktops, laptops, tablets, mobiles, etc. Cost of Gmail Gmail is a free service from Google for general users. If you want a business account, you have to make payments ... Read More