Understanding digital signature Digital signatures are used to present any type of digital data, message or file in the form of numbers or mathematical format. It’s a technique which is used for verifying the authenticity of the message and the user. It tells the receiver of the message that it has been sent by the […]
Understanding Denial-of-Service Attacks
Introduction to denial of service attacks Denial of service attack is also known as DOS in short. It refers to the use of the others computer in order to protect your information, data or services. In this attack the attacker bounds you form accessing your email accounts, websites, online banking accounts and other searching sites […]
Securing your Professional and Personal data
Securing your Data by Backing it Up Backing UP the data is very important because it can be harmed / deleted by many computer attackers. There are thousands of ways in which your computer integrity can suffer, caused by the corrupt files and unwanted interruptions that are commonly present when working online . Different kind […]
Warnings for online safety – Real world warnings for online safety
Importance of warnings We have seen the countless benefits and applications of the internet and technology which has made our world and thing easier and simpler but mirror always has two sides so there are also equivalent number of disadvantages and dangers. Warnings from these dangers are important to remain totally safe from the negative […]
Avoiding Social Engineering and Phishing Attacks
Social engineering attack Social engineering attack is the technique that is used for attacking the certain body; in this technique of attacking the attackers used human interactions and social relationships and skill for targeting the organization or its computerized systems. attackers may also present themselves as new employee or seeking identity, researcher or it can […]
Identiyfing and avoiding spy wares – Preventing spyware
Spyware as name suggests refers to the activities or undercover operations which are not directly visible and prompted but the affect caused by these undercover operations, they also refers to the type f software that automatically sends your hundreds of pop ups. In the world of computers spy wares refers to the sort of infection […]
What is Impact assessment – Kinds of impact assessment
Impact assessment is the procedure that supports the structural development of the policies. It pin point or assess the problem and the objectives that are formulated for that policies. Its implementation and usage are multi dimensional. Basically it quantifies the entire description of the specific problem, process or a product. And make all the possible […]
Using cautions for sending the email attachments
Using cautions for sending the email attachments Cautions are the important tips and measure that should be taken while composing the mail box. And also when attaching any kind of file such as document, jpeg file or data spreadsheets. Cautions must be followed because emails attachments an be dangerous sometimes Characteristics that makes email Attachments […]
Preventing and Responding to Identity Theft
What is Identity theft? Identity theft is and illegal access o use of specific person’s identity and it’s also a crime that can have financial plus emotional consequences. Recommended precaution must be practiced to avoid and minimize the damages at once. Its one of the major problem for the people who works sand submits the […]
What are Good Security Habits – Security Measures
What are good security habits? What are good security habits good security habit are the simple small tasks, steps or activities that takes very little time but provides good security to your data and computer system. If these small habits are adopted and performed consistently they surely reduce the risk factors regarding information threats and […]