Author Archives

Aasmant Patil

Kargil Vijay Diwas

Today marks the 22nd anniversary of Kargil Vijay Diwas, which is being observed across the country. On Kargil Vijay Diwas, the nation remembers its war heroes and pays respect to Martyrs. The day commemorates the success of Indian military forces in Operation Vijay in 1999, when they drove infiltrators supported […]

Rate this:

Word of the day

Masquerade 1.) pretend to be someone one is not. 2.) a false show or pretence Antonyms – bluntness, straightforward Synonyms – pretence, deception Masquerade is used when a person is hiding their true self. Masquerade is also used instead of the words to hide something Eg 1.) All this time, […]

Rate this:

BIG ENDIAN AND LITTLE ENDIAN

– There are two ways that byte addresses can be assigned across words. → computer store data in Memory  →Formating at the byte level of the data which is called endianness which refer to ordering of bytes. →The name big-endian is used when lower byte addresses are used for the […]

Rate this:

Cryptography

Cryptography is a way of safeguarding information and communications by using codes to ensure that only those who are supposed to read and use the information may do so. The prefix “crypt-” denotes “hidden” or “vault,” while the suffix “- graphy” denotes “writing.” Cryptography is a term used in computer […]

Rate this:

Pegasus project

Amnesty International calls the results of the Pegasus Project “false rumours.” Amnesty International stated on Thursday that it supports the Pegasus Project’s conclusions and that the data is “irrefutably connected” to possible targets of NSO Group’s Pegasus malware. According to the human rights organisation, Amnesty never said that the leaked […]

Rate this:

COMPUTER PROCESSORS

Solaris sparc(32-bit): – Intel has given a name to their solar-powered CPU, which was originally shown at IDF 2011 a few days ago. The CPU, codenamed Claremont, is based on an outdated Socket 7 Pentium design but has been tweaked to consume less than 10mW at peak power. Currently, ultra-low […]

Rate this:

Basic operation concepts

-The activity in computers is governed by Instruction.  -To perform a given tosk, a set of instructions (program) is stored in memory. → Individual instructions are brought from the memory into the processor, which execute the specific operation. – Data to be used of operands are also stored in memory […]

Rate this:

List of Malwares

A list of the most dangerous, effective, and most well-known malware strains that have been developed by the cyber-security units of various countries’ intelligence and military branches. Regin Regin, widely regarded as the most powerful malware family ever produced by a nation-state actor, was created by the NSA and shared […]

Rate this:

Kadambai Ganguly

On July 18, 1861, Kadambini Bose was born in Bhagalpur, British India (modern-day Bangladesh). She was born during the Bengali renaissance, a period of religious, social, and educational developments in the Bengal area from the nineteenth to the early twentieth centuries. This cultural revolution had a direct influence on Kadambini […]

Rate this:

Franciso Toledo

Francisco Benjamn López Toledo was born on this day in 1940 in Juchitán, Oaxaca, the centre of the Indigenous Zapotec culture. His exceptional ability for sketching was discovered when he was just 9 years old, and by the age of 19, he had staged his first solo show. Francisco Toledo […]

Rate this:

Data Management

Data management is the process of absorbing, storing, organising, and managing an organization’s data. Effective data management is a critical component of implementing IT systems that operate business applications and offer analytical information to enable corporate executives, business managers, and other end users to drive operational decision-making and strategic planning. […]

Rate this:

Computer Organization and Architecture(COA)

The computer organisation and architecture (COA) course is one of the most essential and comprehensive subjects since it contains many basic concepts and information required in the design of a computer system. The COA is also the most essential component of the syllabus for all computer science degrees at all […]

Rate this:

Methods of Stealing Information

Shoulder Surfing Shoulder surfing is a word that refers to someone looking at another person’s computer or mobile device screen and keyboard in order to collect sensitive information. Direct observation can be accomplished by simply glancing over someone’s shoulder – a practice known as shoulder surfing – or by employing […]

Rate this:

Data Privacy

Data privacy, also known as information privacy, is a subset of data protection that deals with the proper handling of sensitive data, such as personal data but also other confidential data like financial data and intellectual property data, in order to comply with regulatory requirements while maintaining the data’s confidentiality […]

Rate this: