About Me

Author bio not avialable


All Articles by "Abhijeet Patil"



Network Attacks Read

Network Attacks

Any method, technique or process used to attack and compromise the security of the network can be termed as a Network attack. There can be a number of motives behind the attacks like fame, terrorism, greed, etc.  A few types of various …

What the heck is Cloud Computing? Read

Cloud Computing is the next big thing in in Internet?s revolution. The “Cloud” represents “Internet” and “Cloud Computing” means “Internet Computing”. According to Wikipedia, Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices …

Protecting USB Drives from Malwares Read

The emergence of USB drives has become a blessing for the digital world. It has become very easy to carry and transfer data using USB drives. Unfortunately with the increase in use of USB drives, the nuisance of malwares has also increased. …

Data Loss Prevention Read

Information=Money! Information can be anything –financial statements, health records of patients, source codes, intellectual property (IP), trade secrets, design specifications, price lists – anything from which an organization generates profits.  Information is one of the business’s most important assets. Business requires accessing …

Steganography Read

Steganography

What is Steganography? Steganography is the art of hiding information in images. In Greek, Steganography means “covered writing”.In steganography, confidential data is hidden in images to protect it from unauthorized users. So basically it means, hiding a secret message within a cover-medium …

Forensic Analysis of Windows XP Registry Read

WINDOWS XP REGISTRY: Windows stores configuration data in registry. The registry is a hierarchical database, which you can describe it as s configuration database. Configuration database is the data which makes the operating system work. The registry is introduced to replace most …