mysql_secure_installation – MySQL Script

mysql-mysql_secure_installation

mysql_secure_installation – MySQL Script mysql_secure_installation is a shell script available on Unix systems, and enables you to improve the security of your MariaDB or MySQL installation in the following ways: You can set a password for root accounts. You can remove root accounts that are accessible from outside the local host. You can remove anonymous-user accounts. … Read more

Java Changed the Internet

How Java Changed the Internet The Internet helped catapult Java to the forefront of programming, and Java, in turn, had a profound effect on the Internet. In addition to simplifying web programming in general, Java innovated a new type of networked program called the applet that changed the way the online world thought about content. … Read more

Development of the Internet of Things

Development of the Internet of Things Today, there are roughly 1.5 billion Internet-enabled PCs and over 1 billion Internet-enabled cell phones. The present “Internet of PCs” will move towards an “Internet of Things” in which 50 to 100 billion devices will be connected to the Internet by 2020. Some projections indicate that in the same … Read more

IT-SECURITY(NECESSARY)

WHY IS IT SECURITY NECESSARY? Most companies use electronic information extensively to support their daily business processes. Data is stored on customers, products, contracts, financial results, accounting,  etc. If this electronic information were to become available to competitors or to become corrupted, false or disappear, what would happen? What would the consequences be? Could the … Read more

IT-SECURITY (SECURITY AND ITS NEED)

SECURITY AND ITS NEED What needs to be protected, against whom and how? Security is the protection of information, systems and services against disasters, mistakes and manipulation so that the likelihood and impactof security incidents are minimized. A threat is a danger which could affect the security (confidentiality, integrity, availability) of assets, leading to a … Read more

“Internet of Things”

Origin of the concept of “Internet of Things” MIT Auto-ID Center The phrase “Internet of Things” was coined some 20 years ago by the founders of the original MIT Auto-ID Center, with special mention to Kevin Ashton in 1999 2 and David L. Brock in 2001 3 . The term “Auto-ID” refers to any broad … Read more

The Creation of Java

The Creation of Java Java was conceived by James Gosling, Patrick Naughton, Chris Warth, Ed Frank, and Mike Sheridan at Sun Microsystems, Inc. in 1991. It took 18 months to develop the first working version. This language was initially called “Oak,” but was renamed “Java” in 1995. Between the initial implementation of Oak in the … Read more

INFORMATION SECURITY

INFORMATION SECURITY “ To catch a thief, to prevent from theft, think like a thief”. The idea is that if as a security professional you don ̳t know what threats you are facing from crackers/hackers, you will never be able to build an efficient security system. In fact many a times in movies you would … Read more

INTRODUCTION TO INFORMATION SECURITY

INTRODUCTION TO INFORMATION SECURITY Two hundred years ago, you probably would have made a living in agriculture. One hundred years ago, you most likely would have worked in a factory. Today, we live in the Information Age and almost everyone has a job somehow connected to information stored in digital form on a network. During … Read more

Merry Christmas – Program for Christmas Tree in C

merry christmas program in c

Merry Christmas – Program for Christmas Tree in C   To print a Christmas tree, we are printing pyramids of various sizes just one beneath the other. For the decoration, a random character is printed at each position. Height and randomness can be adjusted. This is been repeated frame after frame to give the illusion of a true event. … Read more