Written By: Harshita C Jadhav
It is ‘crucial’ for people to get educated about cybersecurity because it directly affects their lives on a personal level. How? Because human life is more interconnected to the advanced technology today and their devices carry more personal information than they share with others.
People are exposed if they don’t follow cybersecurity practices. There are so many news related to cyberbullying on the internet. The attackers can impersonate people’s identity and carry out criminal activities if they don’t protect their information.
Continue reading “How important is it to educate people about cybersecurity?”
Information technology has become the axis of today’s global and technological developments. With the advancement of the internet, crimes using this tool too have widened. Cybercrimes pose a great threat to individuals, especially women, who form 90 percent of the victims. Every second, one woman in India gets tricked to be a victim of cyber crimes and the online platform is now the new platform where a woman’s dignity, privacy, and security is increasingly being challenged every moment. Cybercrimes incept generally through fake ids created on Facebook, Twitter, and other social media platforms causing grave harm to women, as through these platforms, major blackmailing, threatening, bullying, or cheating via messenger messages and email are done by perpetrators.
Continue reading “Laws to safeguard women against Cybercrimes in India”
Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible.
It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues.
Continue reading “Networking Essentials: What is Wireshark?”
History of cloud computing
I. Start up for the cloud.
Cloud can be considered as a model where related users can get on-demand access to the shared resources as well as applications, servers’ storage or may any hardware device over the internet or the network. Consumers or users cannot get the hardware access directly, only owned and managed by the provider. Use can access allocated services and resources by using a browser anywhere.
Continue reading “Getting Started In “Cloud Computing””
What is Bug Bounty?
If you go to Google & Search What is Bug Bounty you will get :
A reward offered to a person who identifies an error or vulnerability in a computer program or system Identification and reporting of bugs and vulnerability in a responsible way.
Continue reading “How to get started into Bug Bounty?”