Puedes seguirnos en

BUSCADOR

Engineering

Insider are hackers which work in a particular organization, which missuses there privileges to conduct harmful activities to an business organization. An ex-employee can...

Engineering

A worm is a type of a virus which is self-replicating, but it is not harmful to the system or applications files. The function...

Engineering

A DeadLock is the situation where a two programs are sharing the same resources and both of them are waiting for each other to...

Engineering

A flash memory is a storage memory which is nonvolatile and does not have any moving parts. It is called as «Flash» because the...

Engineering

Clickjacking is an exploit which changes the original intention of a click able content on a website with an unintended activity. This activity can...

Engineering

OCTAVE(Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a security framework which finds the level of risk in the system of an organization for...

Engineering

Modem is a very familiar word to everyone of us. It is used for connecting a computer to a telephone line. The telephone lines...

Engineering

Rectification is the process of converting the alternating voltage and current to into the corresponding direct (DC) quantity. The input is AC where as...

Engineering

THE BIOS(Basic Input Output System) provides the microprocessor with all the information required to boot the system.

Engineering

LAN: Local area network is a computer network which interconnected computers in a small limited area such as a Lab, school, small campus, etc…...