Security FAQ

Comprehensive answers to your security questions and problems.

What is Zero Shell?

Zero Shell is a small, portable and redistributable Linux program written for servers and embedded systems to provide network and connectivity services. Zero Shell is not an operating system-based service, and it depends upon a web-based graphical user interface. The user has to log in to the user interface on the web instead of using […]

What is Zero Shell? Read More »

What is Computer Worm?

Worms are malicious computer programs engineered to replicate themselves and spread to other computers over a network.Computer worms can create copies of themselves on the local drive of a computer, removable media like flash drives, and Internet-like attachments.The primary objective of a worm is to spread itself to as many computers as possible using all

What is Computer Worm? Read More »

What is Trojan?

The word Trojan is derived from the ancient Trojans wars in which the Greeks gifted a wooden horse to their enemies, the Trojans. In the world of computers, the role and procedure of a Trojan are not much different. A Trojan is a malicious program that has been embedded inside legitimate and helpful software. Trojans

What is Trojan? Read More »

What is Anti Keylogger?

The anti-keylogger is a computer security software used to detect, block or remove keyloggers. Keyloggers are a hazardous kind of spyware, and they are used to steal confidential information from computer users. An anti-keylogger is software that the computer owner or system administrator uses to detect and remove these keyloggers. Anti-keyloggers are available as standalone

What is Anti Keylogger? Read More »

What is Keylogger?

A keylogger is a spying tool used to obtain private information from a computer user. Keyloggers have different functionalities depending upon their type, but basically, there are two types of keyloggers: •    Keylogger software•    Hardware-based keyloggers After installation, the software keylogger saves all the information entered by the user to the computer using a keyboard

What is Keylogger? Read More »

What is Windows Firewall?

Windows firewall is a software firewall present by default from Windows-based operating systems starting from Windows XP SP2 and onwards. The Windows firewall is a packet filtering firewall. The Windows Firewall was also known as the Internet Connection Firewall (ICF) until its release as the Windows Firewall in 2004. Previously until 2004, the Internet connection

What is Windows Firewall? Read More »

What is Incognito browsing?

Incognito, or InPrivate browsing, is a browsing scheme through which users can browse the internet without leaving a trail in the browser. Incognito browsing prevents anyone else who might be using a system from seeing the previous user’s browsing. It doesn’t store any information related to the user’s browsing pattern. Incognito browsing is available in

What is Incognito browsing? Read More »

What is Buffer Overflow?

Buffer overflow – also sometimes known as buffer overrun – is a bug or anomaly in the software that occurs when a program writing to a buffer in memory overshoots its allocated buffer space and ends up writing into an adjacent or nearby memory space (buffer). Buffer overflows typically are just bugs in the software

What is Buffer Overflow? Read More »

What is Intrusion Prevention System?

An intrusion Prevention System (IPS) is a device or software capable of detecting and preventing intrusion attempts into your network or hosts. Intrusion Prevention Systems are evolved from Intrusion Detection Systems (IDS). IDS were only capable of detecting intrusion attempts and notifying the administration of such an attempt. This has led manufacturers to create IPSs

What is Intrusion Prevention System? Read More »

What is Intrusion Detection System?

An Intrusion Detection System (IDS) is software or hardware capable of inspecting incoming and outgoing traffic and, based on traffic patterns, detecting attacks and alerting network administrators of such attacks. Two types of intrusion detection systems exist:•    Host-based intrusion detection system or HIDS in short•    Network-based intrusion detection system or NIDS in short As the

What is Intrusion Detection System? Read More »