authentication
Posted in Computer Security

Authentication – different techniques to authenticate your apps

Authentication: Authentication can be defined as checking the validity of something if it’s genuine or fake. It is an access policy which is used to…

Continue Reading...
cyber security in cloud computing
Posted in Computer Security

Cyber Security in Cloud Computing – Attackers & Threats

Cyberworld is our own cyber place which seems to be restricted to a corner in a room where you have placed your computer. But if…

Continue Reading...
Computer-Security-threats-vulnerabilities
Posted in Computer Security

Computer Security, Threats & Vulnerabilities – Hardware & Software

Computer Security: Any item you value needs to be protected and secured. Similar is the case with your computer hardware and software. The protection is…

Continue Reading...