Author Archives

prathmesh5100

Viruses and its Classification

A computer virus is a piece of software that can “infect” other programs by modifying them; The modification includes injecting the original program with routine to make copies of the virus program, which can then go on to infect other programs. A virus can be prepended or postpended to an […]

Rate this:

HPE Unified Functional Testing

HP Quick Test Professional was renamed to HPE Unified Functional Testing. HPE UFT offers testing automation for functional and regression testing for software applications. Visual Basic Scripting Edition scripting language […]

Rate this:

Environment Protection Act -1986

The constitution of India clearly states that it is the duty of the state to “protect & improve the environment and to safeguard the forests & wildlife of the country”. The department of environment was established in India in 1980. this later became the Ministry of environment & forests in […]

Rate this:

Wireshark – Packet Analyzer

Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues. Wireshark is cross-platform, using […]

Rate this:

BHOPAL GAS TRAGEDY

Around 1 a.m. on Monday, the 3rd of December, 1984, In the city of Bhopal, Central India, a poisonous vapour burst from the tall stacks of the Union Carbide pesticide plant. This vapour was a highly toxic cloud of methyl isocyanate. 2,000 people died immediately, 300,000 were injured. 7,000 animals […]

Rate this:

Wannacry Cyber Attack

What was the cyber attack? The WannaCry ransomware attack was a worldwide cyber attack in May 2017 by the WannaCry ransomware. It propagated through EternalBlue, an exploit developed by the […]

Rate this:

Flavors of Unix

Unix is not a single operating system. It is in fact a general name given to dozens of o.s. by different companies, organizations or groups of individuals. These variants of unix are referred to as flavors. Although based on the same core set of unix commands, different flavors can have […]

Rate this:

Optic Fibers in Communication

What are optical fibers ? It is thin strands of pure glass which carry data over long distances. At very high speeds. The Fiber can be bent or twisted. Fibers are used instead of metal wires because signals travel without loss. Also, fibers are immune to the electromagnetic interference. In an general […]

Rate this:

Types of Security Attacks

Active Attacks It is an attempts to alter system resources or affect their operation. It includes Modification of data, or creation of false data. Four categories Masquerade Replay Modification of messages Denial of service Masquerade : It takes place when one entity pretends to be a different entity. For example, […]

Rate this:

History of Unix

Origins of Unix UNIX development was started in 1969 at Bell Laboratories in New Jersey. Bell Laboratories was (1964–1968) involved on the development of a multi-user, time-sharing operating system called […]

Rate this:

Internet of Behaviors (IoB)

Definition The collection and use of data to drive behaviors is called the Internet of Behaviors (IoB).  An example of it is industrial sites having employed computer vision to determine if employees were complying with mask protocol and then collecting this behavioral data to be analyzed by the organizations to influence people […]

Rate this: