MOBILE SECURITY

*INTRODUCTION* In the field of networking, the specialist area of network security consists of the provisions made in an underlying computer networksrtp, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together. Security Management … Read more

ANONYMOUS SURFING

“HIDING YOUR IDENTITY: ANONYMOUS SURFING” Anonymous web browsing is browsing the World Wide Web without making ones IP Address or any other personally identifiable information available to the websites that one is visiting. A degree of anonymity can be achieved by using a proxy server. If the proxy server is trusted, anonymity will be retained … Read more

Functions in C

function in c

Functions C Human is an intelligent species, but still cannot perform all of life’s tasks all alone. He has to rely on others. You may call a mechanic to fix up your bike, hire a gardener to mow your lawn, or rely on a store to supply you groceries every month. A computer program (except … Read more

C program to convert time in Hours:Minutes:Seconds to seconds

c program to add 2 numbers

C program to convert time in Hours:Minutes:Seconds to seconds /* C program to convert time in hours:minutes:seconds to seconds */ #include <stdio.h> int main() { int hour, minute, second, timeinsec; printf(“Enter the value for hour:”); /* get hour value from user*/ scanf(“%d”, &hour); printf(“Enter the value for minute:”); /* get minute value from user */ … Read more

internet security types

“TYPES OF INTERNET SECURITY” NETWORK LAYER SECURITY- TCP/IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet. These protocols include SSL and TLS for web traffic, PGP for email, and IPsec for the network layer security. IPSEC PROTOCOL- This protocol is designed … Read more

INTERNET SECURITY

“INTRODUCTION” In order to provide useful services or to allow people to perform tasks more conveniently, computer systems are attached to networks and get interconnected. This resulted in the world-wide collection of local and wide-area networks known as the Internet. Unfortunately, the extended access possibilities also entail increased security risks as it opens additional avenues … Read more

Evolution of Java

java script

“The Evolution of Java” The initial release of Java was nothing short of revolutionary, but it did not mark the end of Java’s era of rapid innovation. Unlike most other software systems that usually settle into a pattern of small, incremental improvements, Java continued to evolve at an explosive pace. Soon after the release of … Read more

DATA BACKUP

“INTRODUCTION” Data backup is said to be the best prevention for data loss. Now the question arise what exactly Backup is? It is a process of having duplicate copy of the original one. It is an activity of copying files or databases so that the data will be preserved in case of any accidentally or … Read more

VIRUS

“VIRUS (VITAL INFORMATION RESOURCES UNDER SEIZE)” A virus is a computer program that executes when an infected program is executed. Therefore only executable files can be infected. On MS-DOS systems, these files usually have the extensions .EXE, .COM, .BAT or .SYS another class of files called overlay files can also be infected. These files often … Read more