What are Botnets? Read

What are Botnets?

IntroductionRecently, Indian Cinema experienced an unusual phenomenon of technology and imagination – “Ro ‘bot’s”. The superstar of the south was again at his best and we could see excellent combination of talent and technology.But ever wondered, if this was to happen for …

Android Application Safety Read

Android is a Linux based mobile "smartphone" operating system. Android(tm) was designed with security in mind, and almost all of the important functions of the system are protected by layers of defense. Applications installed on the system declare what features and functions …

Whois Query under Microsoft Read

WHOIS is a query and response protocol that provides information about the domains, networks and hosts. If the domainis found, the whois query would provide following information Name, postal and email address of the person and contact numbers of the person under …

Preventing Fake Antivirus Read

IntroductionThe threat of viruses has increased and computer users have fear of getting affected with viruses thus the attackers knowing this concern of users attackers have come up with this Fake Antivirus which you may come across while surfing the internet through …

What the heck is Cloud Computing? Read

Cloud Computing is the next big thing in in Internet?s revolution. The “Cloud” represents “Internet” and “Cloud Computing” means “Internet Computing”. According to Wikipedia, Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices …

Protecting USB Drives from Malwares Read

The emergence of USB drives has become a blessing for the digital world. It has become very easy to carry and transfer data using USB drives. Unfortunately with the increase in use of USB drives, the nuisance of malwares has also increased. …

Robbed in London : New email scam Read

Recently I came across a new email scam strategy. It's like you will get a mail from your friend's email address that your friend went to some place (London preferably) for vacation and got mugged in the hotel. She lost everything except …

How to avoid Phishing Read

Phishing is used to gain access to personal and financial information.Your browser may not support display of this image. Be aware when submitting personal or financial information on Web sites Before submitting financial information through a Web site, as shown in the …