MALWARES
“INTRODUCTION TO MALWARES” Malware is a collective term for any malicious software which enters system without authorization of user of
Read moreSelection Sort Algorithm Selection sort is an algorithm that selects the smallest element from an unsorted list in each iteration
Read more“VPN THREATS” HACKING ATTACKS- A client machine may become a target of attack, or a staging point for an attack,
Read more“IPSEC VPN” IPSec (Internet Protocol Security) is a framework for a set of protocols for security at the network or
Read more“VPN TYPES” Virtual private network technology is based on the idea of tunneling. VPN tunneling involves establishing and maintaining a
Read more“INTRODUCTION TO VPN” Tremendous strides in computer networking have increased the productivity of todays workers in todays workplace. The security
Read moreHeap sort algorithm Heap sort was invented by John Williams. Heap is a complete binary tree in which every parent node be
Read moreMost commonly available servers operate on a general-purpose OS. Many security issues can be avoided if the OSs underlying the
Read moreWINDOWS VULNERABILITY OVERVIEW The family of Windows Operating systems supports a wide variety of services, networking methods and technologies. Many
Read moreQuick Sort Algorithm There are may versions of Quick sort, which is one of the most popular sorting methods due
Read more