authentication
Posted in Computer Security

Authentication – different techniques to authenticate your apps

Authentication: Authentication can be defined as checking the validity of something if it’s genuine or fake. It is an access policy which is used to…

Continue Reading...
cyber security in cloud computing
Posted in Computer Security

Cyber Security in Cloud Computing – Attackers & Threats

Cyberworld is our own cyber place which seems to be restricted to a corner in a room where you have placed your computer. But if…

Continue Reading...