Security FAQ

Comprehensive answers to your security questions and problems.

What is Torrent Network?

The purpose of anonymizers is to make online activity untraceable for users. Anonymizers are proxy servers that effectively intermediary between the client and the actual server. Anonymizer attempts to provide a shield of anonymity by protecting the identification information of the existing systems using the service or resources. Various types of anonymizers are available freely […]

What is Torrent Network? Read More »

What is P2P Network?

P2P stands for ‘peer-to-peer’. ‘P2P network’ refers to a particular type of network in which each and every workstation has equivalent responsibilities and capabilities. This particular network model doesn’t have any dedicated computing systems that would act as servers for the network. An alternative definition of a P2P network is an architecture in which the

What is P2P Network? Read More »

What is Spyware?

Spyware has been coined from the base word of spying. Spyware is a typical type of malware that would spy on the activities of the user without their knowledge. The spread of Spyware is normally through USB drives, email attachments, or through the network. Unlike viruses, which infect other files and are noticeable through these

What is Spyware? Read More »

What is Virus?

A virus in the computer world is effectively a program that may infect other programs by copying itself onto the program and making the host program unusable. Computer viruses are tiny software programs that are inherently designed to spread from computer to computer and in most cases interfere with the normal operations of the computer.

What is Virus? Read More »

What is Rootkit?

A rootkit is basically used to describe the process or mechanisms by which malware including viruses, Trojans, and spyware attempt to hide themselves or their presence from antivirus tools, antispyware tools, and/or system management tools. The term Rootkit has been derived from the combination of two different words. First is “Root” which means that all-powerful

What is Rootkit? Read More »

What is Phishing?

Phishing is the mechanism of fooling/misguiding a user in order to acquire sensitive information like usernames, passwords, bank account details, credit card details, etc. by acting/purporting as a trustworthy entity during electronic communication. Phishing is normally carried out by sending an email to a user masquerading as a legitimate or trustworthy enterprise in order to

What is Phishing? Read More »

What is Botnet?

A botnet is a technical term given to a collection or group of software agents or in other words robots that function autonomously. The term is often and commonly used for a network of infected systems often called zombies. But the general idea is that of a network of computers that allow for distributed processing

What is Botnet? Read More »

What is VPN?

VPN or in other words Virtual Private Network is a technology that allows computer users or companies to create a secure connection over the public network, for example, the Internet, and connect to their destination. VPN allows two private networks to communicate securely over the Internet through the establishment of a virtual network. In other

What is VPN? Read More »

What is DNS Hijacking?

DNS (Domain Name System) hijacking is also known as DNS redirection or DNS spoofing. DNS hijacking is the process of redirecting the requesting IP address to servers other than the originally requested DNS server. DNS hijacking is used for malicious purposes, primarily for phishing. Technically speaking, DNS hijacking does not fall in the category of

What is DNS Hijacking? Read More »

What is SSH?

SSH stands for Secure Shell. Secure Shell is a network security protocol that provides a secure and reliable channel for two networked connected computers for transmitting data and confidential information. SSH was originally built to replace insecure remote shells like Telnet. These insecure shells sent information like passwords and usernames in plain text format that

What is SSH? Read More »