Understanding SD card

Secure Digital card  We have already discussed about SD Card  in previous post The little SD card - has provided us with the de facto means of portable storage for a…

Continue Reading

What is SD card

Understanding SD Card There are essentially two basic forms of electronic memory.1.Hard disk drive memory2.Transistor-based semiconductor memoriesFlash drive belongs to the second category of memories. Hard disk drive contains movable parts…

Continue Reading

Cyber threats

Type of cyber attacks There are two types of cyber threats, Active and Passive attacks An active attack is a network exploit in which a hacker attempts to make changes…

Continue Reading

What is cyber attack

Cyber Attack A cyber attack is any type of offensive action that targets a computer , computer networks or personal computer devices, using various methods to steal, alter or destroy…

Continue Reading

What is Cybersecurity

What is Cyber Security In a computing context, security comprises cyber security and physical security. Cyber security is also referred to as information technology security.It refers to the body of…

Continue Reading

How to prevent cybercrime

What is cyber crime Cybercrime is any criminal activity that involves a computer, networked device or a network. While most cybercrimes are carried out in order to generate profit for…

Continue Reading

What is Adware

What is spyware As its name suggests, is designed to spy on what a user is doing. Hiding in the background on a computer, this type of malware will collect…

Continue Reading

Types of Adware

What is adware in computer This is a type of software that displays advertising on a computer, redirects search results to advertising websites and collects user data for marketing purposes. Adware's…

Continue Reading

Computer Malware

Malware Virus What is Malware? Malware is a software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.“Malware” is short for “malicious software” -computer…

Continue Reading

Adware Removal

History of Adware The use of Adware began roughly in 1995. Some industry experts considered all adware to be spyware. Later, as the legitimacy of adware grew, it was thought…

Continue Reading

Wi-Fi Tutorial

What is Wi-Fi If you are at a shopping center,library,hotel or an airport, chances are you' are able to access a wireless network. Nowadays almost everyone uses wireless networking, also…

Continue Reading

How wifi works

How does wifi work WiFi works on the same principle as other wireless devices - it uses radio frequencies to send signals between devices. The radio frequencies used in walky-talkies,…

Continue Reading

Securing wireless networks

Wireless security Wi-Fi or wireless networks are great for the home and small business users, allowing to use of multiple internet capable devices on one shared connection. But wireless networks…

Continue Reading

I love iPhone

Why iPhone is the  best The Apple is well known for its quality products. iPhones biggest power is its iOS which becomes more powerful because of its hardware which is built only…

Continue Reading

Best in ear headphones

how to buy earphones guide When you're looking for a new pair of headphones, there's a lot of questions you should be asking yourself. 1. What do I want to…

Continue Reading

Computer Virus

What is Computer Virus Norton Symantec says ‘In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and…

Continue Reading

Worst computer viruses

Some of the worst computer Viruses of all times are 1. The Morris Worm The Morris Worm was a self-replicating computer program (worm) written by Robert Tappan Morris, a student…

Continue Reading

what is backdoor virus

Backdoor Virus A computer trapdoor, also known as a back door, provides a secret -- or at least undocumented -- method of gaining access to an application, operating system or…

Continue Reading

Funny computer viruses

Computer Virus It is malicious code that replicates by copying itself to another program, computer boot sector or document  and changes how a computer works. The virus requires someone  to knowingly or…

Continue Reading

Bluetooth Technology

What is Bluetooth Technology Bluetooth allows for data transfer from the source to the receipt when both are connected via Bluetooth. It acts much like an invisible cord between the…

Continue Reading

Bluetooth 5

What is Bluetooth 5 Bluetooth 4.1,4.2 and 5 are various versions of Bluetooth technology. Every higher version has more and advanced feature. Bluetooth 5 is the latest version of Bluetooth that has…

Continue Reading

iPhone 11 launch date

Apple confirms 10 September 19 launch event for iPhone 11 release, specs, and price   The new iPhones are just two weeks away The three new iPhone 11 models will…

Continue Reading

Bluetooth piconet

Bluetooth master slave concept The Bluetooth connection between two devices is a multi step process involving 3 states-  Inquiry — One device runs an inquiry to try to discover the…

Continue Reading

Headphones Tutotrial

What is Headphone Headphones are the miniature form of loudspeakers, hanging on to ears. They deliver same music at a personal level with good bass,less noise and directly to your…

Continue Reading

Radio Frequency

Electromagnetic Spectrum It is an entire range of wavelength  in the range 104 to 1011 or 1012 Hz, It contains all the frequency of electromagnetic waves including gamma rays, ultraviolet, visible, light waves,…

Continue Reading

iPhone 11 features

Most expensive phone of 2019 If Apple follows a old set pattern, it would announce the 2019, iPhones on Sept 10, which is a Tuesday. With less than a month left for the 2019 iPhones…

Continue Reading

Passphrase

Password A password, a secret word or phrase that must be used to gain admission to a device/network.is typically composed of not more than 10 letters or symbols, or a…

Continue Reading

WPA3

WPA3 Wi-Fi is about to get one of its biggest ever security updates.WPA3 (Wi-Fi CERTIFIED WPA3™) is the newly announced standard in WiFi security, offering more secure private and public…

Continue Reading

WPA-ET

WPA2 It is the latest security protocol developed by  Wi-Fi Alliance.The Personal mode and the Enterprise mode deploy encryption method. These are called AES-PEAP/CCMP to encrypt data transmitted over the…

Continue Reading

WPA2 Personal Mode

What is WPA2 It is a security technology for Wi-Fi networks. It was developed to overcome the weaknesses of  WEP (Wired Equivalent Privacy), WPA provides strong encryption by use of…

Continue Reading

End of content

No more pages to load

Close Menu