Wireshark is an open source network packet analyzer too that runs on both Windows and UNIX platforms. Wireshark captures the network packets and then display the packet data in detail. Wireshark is widely used to analyze the network traffic, to find the loopholes in the network architecture, to detect some of the attacks on the network and to provide solutions for...
Rehan
8:48 PM
How they are spying on us.
Click here to see the picture...
Please like our facebook page too....
Rehan
1:03 AM
Who Owns Computer Generated Works
We have been using digital contents since a long time when the computers replaced human manpower and emerged as a tool to work faster and comfortably. Since that time technology has changed a lot and now a day’s computer are being used as an essential and integral part in every domain of work. Not only that the use of smart phones with the internet has revolutionized...
Rehan
6:33 PM
Biometric Security System
Abstract
With the growth of new technologies and new inventions being done everyday new methods of identifying a person are developed. Now carrying an ID card with you is not the trend of checking or authenticating a person. Biometric devices are there to check your identity that provides high level of security and a good level of surety that it will not be...
Rehan
5:49 AM
Can a bank be termed as an Intermediary?
As all the organizations are in the race to go online and they do want to lead in this race, we are witnessing the change that had happened in these few years. We cannot imagine how our life has been changed or transformed by these facilities. Now we can pay bills, shop and can do many more things online. But when we shop for or pay for anything online either we pay...
Rehan
6:40 AM
Business Continuity Planning and Disaster Recovery Planning after the catastrophe of 9/11 attacks.
Business continuity
planning and disaster management are the most important aspects from the view
of an organization now after the attack of 9/11 at New York and Washington D.C.
BCP is a preventive measure which that identifies the mission critical business
functions and enact policies, procedures, plans and process to insure the
continuation of these functions in...
Rehan
7:40 PM
Email borne viruses and worms, there preventive and corrective measures
As
the world is becoming more and more digitized day by day, peoples are
becoming technology dependent and an E for electronic is being attached to
several mediums we should keep in mind all the possible risks and threats which
could cause us damage or loss. When a person uses he/she is most usually
concerned about viruses and worms because they could...
Total Pageviews
Follow Us
Powered by Blogger.