Friday, 30 December 2016

What is Virtual Private Network (VPN) ?

What is a Virtual Private Network (VPN)? A VPN or Virtual Private Network is a network connection that enables you to create a secure connection over the public Internet to private networks at a remote location. With a VPN, all network traffic (data, voice, and video) goes through a secure virtual tunnel between the host device (client) and the VPN provider’s servers, and is encrypted. VPN technology uses a combination of features such...

Wednesday, 14 December 2016

Virus.

Computer Virus Information.   What is a computer virus? Think of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps you from functioning normally and often requires something powerful to get rid of it. A computer virus is very similar. Designed to relentlessly replicate, computer viruses infect your programs and files, alter the way your computer operates or stop it from working altogether. It’s...

Tuesday, 6 December 2016

Download Youtube Videos Without Software.

...

Monday, 5 December 2016

Top Five Hackers of all time.

     _____________Hackers__________________ That’s right. The term “hacker” originally referred to the second type, which held absolutely no malevolent connotations. Only recently has the term been used to refer primarily to criminal masterminds. There are good hackers and bad hackers. Nowadays, benevolent hackers are often called “white hats” while the more sinister are called “black hats.” Jonathan James:- Jonathan James...

Types of Hackers

                        HACKERS TYPES 1. White hat hacker 2. Gray hat hacker 3. Black hat hacker White Hat and Grey Hat Hacker & What is the Real Difference? What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker.However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we...

Top Computer Viruses of All Time.

1. Melissa           A macro virus named after a Miami stripper, was so effective in 1999 that the tidal wave of email traffic it generated caused the likes of Intel and Microsoft to shut down their email servers. The virus contained a Word document labeled List.DOC as an attachment to an email allowing access to porn sites. The email was first distributed to a Usenet group but quickly got out of hand....

Hackers VS Crackers

Hackers VS Crackers :-                             A Cracker is a person who breaks in to a security system only with a malicious intent. A person who breaks in to a computer system for the purpose of earning profit, finding security loopholes of the system, showing protest or just for the sake of challenge is called a hacker. In recent times the differentiation...