Loading...

Articles on Cyber Security

Today facebook is one of leading social networking site. It was launched in February 2004, owned and operated by Facebook, Inc. Today facebook has millions of users, which is a milestone for any company plying its trade on the Internet.

Facebook has evolved rapidly from a raw social networking website into a billion dollar company in a short span of time.

Facebook hosts valuable data of all its active users, which pertains to their personal details, contact details, geographic details, and other information related to interests, hobbies, and favourite hangouts.

Today, there is a lot of hype about open source in the IT Industry.

But the Question is that what is OpenSource?

Some People Say that opensource means free software i.e. the software which is said to be open source software will be freely available to the masses.

Other says that if the software is open source software then the “sourcecode” of the software i.e. the programming instructions are also available.

Actually, the above said things about open source are true but the actual power of open source is even more than this.

Is your computer speed is similar to the speed of a tortoise? Is your computer drives contain double the number of folders that you have created? Do you often get mysterious error messages? Is your computer hangs every time; you open 2 or 3 applications simultaneously?

Well if you are facing any of the problems listed above then your computer is infected with ‘Viruses’.

Android is a Linux-based operating system for mobile devices such as
smartphones and tablet computers, developed by Google in conjunction
with the Open Handset Alliance. It had a worldwide smartphone market
share of 59% at the beginning of 2012, and as of year 2012 there were
500 million devices activated and 1.3 million activations per day.
There are a host of advantages that Android OS has like Open Platform/ License Free, Robust OS Kernel, Innovative Library Packages,
Easy Application Development, Rapid Improvement, etc.
The advantages are listed below:-
Debugging a shell script is very essential to check your script for any errors. There are different debugging tips and tricks useful for running your scripts
without any flaw.

Prevention is always better than cure. It is always better to take certain precaution while operating the net. ANUP GIRDHAR, Editor In Chief, Cyber Times advocates that we should follow 5 main key points :
Precaution, Prevention, Protection, Preservation and Perseverance for online security.

Steps to prevent cyber crime:-

The concept of cyber crime is not totally different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the permit of the state.
Crime is asocialand economic phenomenon and is as old as the human society. Crime is a legal concept and has the sanction of the law. Crime or an offence is “a legal wrong that can be followed by criminal proceedings which may result into punishment.” The hallmark of criminality is that, it is breach of the criminal law. 

Think before speaking - This is not something new, but however often we hear it, we forget to apply it. To think before speaking means to show consideration to the other and then we say the right thing, at the right time, in the right way.

Listen with both ears - We should be an active listener by tuning in fully and being present fully with the person and with the moment. If I am not, I listen through one ear and let it out of the other, or I only half listen, which finally creates misunderstandings.

Introduction 
Cloud computing means using the computing resources both hardware and software, that are delivered as a service over Internet. In other words, computer and software services necessary for computing works provided via the internet is called cloud computing.
When we think about the need of IT, cloud computing comes into focus like the requirement of a way to increase or add capabilities on the fly without investing in new infrastructure, training new personnel, licensing new software etc. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT’s existing capabilities.
Users of virgin mobile must pay attention as the data in your mobile phones is not safe anymore. Your phone number is the main key to your personal information. According to Kevin Burke, who warned Virgin Mobile USA customers about a conspicuous security hole in the phone company's account login protocol said, "If you are one of the six million Virgin subscribers, you are at the whim of anyone who doesn’t like you."
USA users of Virgin Mobile manage their account by logging in through an online portal, which requires a mobile number and a 6-digit pin. Once inside, customers can check their call records, change the handset associated with their number, and update their personal details