Any method, technique or process used to attack and compromise the security of the network can be termed as a Network attack. There can be a number of motives behind the attacks like fame, terrorism, greed, etc. A few types of various …
- About Me
Author bio not avialable
All Articles by "Abhijeet Patil"
Cloud Computing is the next big thing in in Internet?s revolution. The “Cloud” represents “Internet” and “Cloud Computing” means “Internet Computing”. According to Wikipedia, Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices …
The emergence of USB drives has become a blessing for the digital world. It has become very easy to carry and transfer data using USB drives. Unfortunately with the increase in use of USB drives, the nuisance of malwares has also increased. …
Information=Money! Information can be anything –financial statements, health records of patients, source codes, intellectual property (IP), trade secrets, design specifications, price lists – anything from which an organization generates profits. Information is one of the business’s most important assets. Business requires accessing …
What is Steganography? Steganography is the art of hiding information in images. In Greek, Steganography means “covered writing”.In steganography, confidential data is hidden in images to protect it from unauthorized users. So basically it means, hiding a secret message within a cover-medium …
WINDOWS XP REGISTRY: Windows stores configuration data in registry. The registry is a hierarchical database, which you can describe it as s configuration database. Configuration database is the data which makes the operating system work. The registry is introduced to replace most …