What is Authorization?

The process of determining whether the user who has logged in has the authority to access a specific recourse as requested. In other words, authorization is the process of specifying access rights to a subject over a set of objects. Authorization can also be linked with the access control lists that are found in operating […]

What is Authorization? Read More »

What is Anonymizer?

Anonymizers are tools that allow — or attempt to allow — users to make their online activity untraceable. Anonymizers are proxy servers that act as intermediaries between the client and the actual server. An anonymizer attempts to provide a shield of anonymity by protecting the identification information of the actual systems that are using the

What is Anonymizer? Read More »

What is Torrent Network?

The purpose of anonymizers is to make online activity untraceable for users. Anonymizers are proxy servers that effectively intermediary between the client and the actual server. Anonymizer attempts to provide a shield of anonymity by protecting the identification information of the existing systems using the service or resources. Various types of anonymizers are available freely

What is Torrent Network? Read More »

What is P2P Network?

P2P stands for ‘peer-to-peer’. ‘P2P network’ refers to a particular type of network in which each and every workstation has equivalent responsibilities and capabilities. This particular network model doesn’t have any dedicated computing systems that would act as servers for the network. An alternative definition of a P2P network is an architecture in which the

What is P2P Network? Read More »

What is Spyware?

Spyware has been coined from the base word of spying. Spyware is a typical type of malware that would spy on the activities of the user without their knowledge. The spread of Spyware is normally through USB drives, email attachments, or through the network. Unlike viruses, which infect other files and are noticeable through these

What is Spyware? Read More »

What is Virus?

A virus in the computer world is effectively a program that may infect other programs by copying itself onto the program and making the host program unusable. Computer viruses are tiny software programs that are inherently designed to spread from computer to computer and in most cases interfere with the normal operations of the computer.

What is Virus? Read More »

What is Rootkit?

A rootkit is basically used to describe the process or mechanisms by which malware including viruses, Trojans, and spyware attempt to hide themselves or their presence from antivirus tools, antispyware tools, and/or system management tools. The term Rootkit has been derived from the combination of two different words. First is “Root” which means that all-powerful

What is Rootkit? Read More »

What is Phishing?

Phishing is the mechanism of fooling/misguiding a user in order to acquire sensitive information like usernames, passwords, bank account details, credit card details, etc. by acting/purporting as a trustworthy entity during electronic communication. Phishing is normally carried out by sending an email to a user masquerading as a legitimate or trustworthy enterprise in order to

What is Phishing? Read More »

What is Botnet?

A botnet is a technical term given to a collection or group of software agents or in other words robots that function autonomously. The term is often and commonly used for a network of infected systems often called zombies. But the general idea is that of a network of computers that allow for distributed processing

What is Botnet? Read More »

What is VPN?

VPN or in other words Virtual Private Network is a technology that allows computer users or companies to create a secure connection over the public network, for example, the Internet, and connect to their destination. VPN allows two private networks to communicate securely over the Internet through the establishment of a virtual network. In other

What is VPN? Read More »