- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Pranav Bhardwaj has Published 430 Articles
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
332 Views
Ensure that none of the devices on your network are affected. Once you've established that your network is clean and that no illegal traffic is being sent out, find out where your IP address was blacklisted or blocked, then contact them to have it removed.There will be multiple procedures to ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
1K+ Views
What is Single Sign-On?SSO is a system that merges several application login windows into a single screen. To access all of their SaaS services, a user just has to input their login credentials once on a single page using SSO.SSO is widely used in a corporate context where user applications ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
324 Views
What is Data Skewing?In a skewing attack, attackers attempt to fabricate (or skew) data in order to influence an organization's decision in their favor. Skewing assaults may be divided into two types −Machine Learning Data Poisoning Attacks − It occurs when an attacker alters the training data used by a ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
2K+ Views
Cybersecurity is an important part of a company's Business Continuity Plan (BCP), and policies and procedures pertaining to key technology and sensitive data protection must be considered.The process of developing preventative and recovery measures to cope with possible cyber threats to a company or to assure process continuity in the ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
290 Views
Cyber threats are constantly changing. Adopting a risk-based strategy to cyber security, where you continually examine your risks and if your present procedures are suitable, is the most effective way to safeguard your organization against cyber threats.A risk-based strategy ensures that the cyber security measures you install are tailored to ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
219 Views
What is Credential Stuffing?Credential stuffing is a term for hacking in which a hacker secures user credentials by breaching a system and then tries to utilize those credentials with other systems. Like different types of related hacking, Credential stuffing attacks rely on hackers to break into a network and steal ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
409 Views
What is a Content Delivery Network?A Content Delivery Network (CDN) is a collection of computers that keep data copies at several network nodes. A well-designed and adequately executed CDN increases data access by increasing bandwidth and reducing access latency. Web objects, apps, database queries, downloadable data objects, and video streams ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
386 Views
What is CAPTCHA?CAPTCHA is short for Completely Automated Public Turing Test to tell Computers and People Apart. It is a technique used by computers to identify if they are communicating with a human or another computer. As computers become more prevalent and computerized jobs and services become more common, the ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
1K+ Views
How Does a Ping Flood Attack Work?Ping flood, which is also known as ICMP flood, is a common DoS technique in which an attacker floods a victim's computer with ICMP echo requests, or pings, in order to bring it down.The attack includes sending a large number of request packets to ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
1K+ Views
Many card transactions that would have been done in person can now be done online because of the growing popularity of e-commerce platforms Card-not-present (CNP) payments have risen. As a result, they provide greater convenience for consumers starting the transaction. They require less from retailers, who no longer need to ... Read More