Deprecated: Function create_function() is deprecated in /home/content/p3pnexwpnas15_data03/27/3792227/html/wp-content/plugins/wordpress-23-related-posts-plugin/init.php on line 440

Author Archive Jayanthi

ByJayanthi

Cryptography

After having done numerous posts on Information security, here is another basic and elementary concept in Information security – ‘Cryptography’. The concept of Cryptography also encloses encryption and decryption. 

Like any other subject, the field of Cryptography is another massive ocean of information. It is the technique of hiding information to bolster secure communication. Cryptographic techniques are an absolute necessity in this digital age where any information can be snooped on. These are a few basic concepts related to Cryptography:

Read More

ByJayanthi

Reflections on the BlogchatterA2Z journey…

It was the month of March. There were cues for the BlogchatterA2Z challenge all around social media. I was suddenly tempted to participate – should I do it or not?   I had seen many people participating the previous years – but never once thought I will be tempted to participate as well. 

Anyways, I gave in to temptation and registered to participate. But what would I write about (mine was a “Technical blog sprinkled with personal thoughts” :))  – was my next thought. Ultimately, I stuck with my blog theme as the theme for the “Blogchatter challenge” as well. More questions rolled in – will I be able to complete it, how will I do it – considering that school for my kids will be off and more and more questions cropped in!!

Read More

ByJayanthi

What are Zombie systems?

In the Information security realm, there are different types of attacks occurring all over the world. There are virus attacks, phishing, worm attacks, DOS  and DDoS attacks and others. In order to understand “Zombie systems”, we have to talk about DDoS(Distributed Denial of Service) attacks. Read More

ByJayanthi

Yoga – the panacea for all ills?

The twenties never seem to last forever.  Body aches and lifestyle diseases catch up with us sooner than later. Exercise seems to be the only way to combat them. While, any form of exercise seems to be good for the body and mind – be it bicycling, walking, swimming, running – these traditional forms of exercise might not be a viable option as we start aging. These forms of exercise leads to wear and tear of the knee or the other joints. It is here that Yoga steps in to cure the human body and mind.

Read More

ByJayanthi

XOR operator in Java

In the Java programming language, a ‘variable’ is used to store a value. Different kinds of operations can be performed on the variables by means of ‘operators’.  The Java programming language has a number of operators and these are listed below:

Read More

ByJayanthi

Why do parents name their children after Gods? (mostly Indian parents as I have understood it)

Whether you are from the North, South, East or Western regions of India – there is a similar pattern that parents follow for naming their children – giving them God’s names (of course, not all of them do it – but most of them do it)

Many of them might not have the name directly, but if you look and introspect closely, the name will be linked to a God. 

Read More

ByJayanthi

VPN(Virtual private network)

VPN or ‘Virtual Private network’ is exactly what it states – it is a private and virtual connection to your corporate network. While it is easy and comfortable to make use of free and open Wi-Fi in open spaces to access corporate resources, it is highly susceptible to different types of attacks(stealing your password might be the simplest one) VPNs enable professionals to access corporate resources in a safe and secure manner.

Read More

ByJayanthi

Usage of Information security

‘Information security’ in the broadest sense is the protection of information and assets from malicious elements. Individuals and organizations are both subjected to virus, ransomware, data breach attacks and hence this concept of ‘information security’ applies to all. Let us see a few of the ‘Information security’ concepts being applied to organizations as well as individuals.

Read More

ByJayanthi

Time

What if we go back in ‘time’? What if we could freeze the current happy “time”? What will be our life like 5 years or 10 years later? How would it be for a competitive exam(particularly in India) to have that extra 5 minutes? Why are we so bored at some time point of life?

“I have to get up at 6:00 a.m.” “I have to go for a meeting at 2:00 p.m.” “I have to hit the bed by 10:00 p.m.” “If only I was a few minutes early for my interview… ” ” I have to get married by 25″, ” I have to retire by 60″….Somethings are timeless, somethings are timely…Time… time.. time… everything in the world is related to ‘Time’! Isn’t it amazing how our lives are intertwined with ‘Time’? We are all wedded to the dear clock to regulate our lives! πŸ™‚

Read More

ByJayanthi

Security

Social media and privacy concerns go hand in hand. On the one hand, we love the reach of sharing our day to day moments, our happiness, our sadness with the whole world with the click of a mouse – on the other hand, we are(and we should be) worried about the invisible eyes that are seeing the very same posts too! How do we strike a balance and ensure the security of our information will form the basis of this post. Some of the initial points are general pointers related to overall security.

Read More