• Which is more secure: SSL, TLS or HTTPS

    Data that is passed “as-is”(without encryption) is prone to attacks by hackers and people with malicious intent. In order to pass critical financial information without being eavesdropped, it is crucial to encrypt all data. Encrypting communication allows one to pass credit card numbers, banking information and other sensitive details between the client and server and more

  • Have you heard about cyber diplomacy?

    ‘Diplomacy’ is defined as “the art of dealing with people in a sensitive and tactful way” and cyber diplomacy is a careful extension to that. Social media is an absolute necessity for individuals, businesses and government organizations. Most major heads of state are present either on Facebook, Twitter and/or other social media platforms. Given the more

  • Magic of ‘Belur’!

    I have always been a fan of history and particularly Indian history. India is a glorious and old country with a rich heritage. There are numerous temples and other architectural monuments all around the country which are several hundred years old. While I have never had the opportunity to visit the monuments in the Northern more

  • Definition of the day: Honeypots

    “Honeypots” in network security is a computer system which entices hackers to attack it.  All ports are kept open on the  system and the computer acts normally with its services(but in reality, it is isolated and monitored) The main idea behind setting up “honeypots” is used to study the motives of malicious individuals and track more

  • Introduction to Bitcoins

    Even as the Bitcoin fork is making news, and there is  “Bitcoin” and  “Bitcoin cash” now, we will deal with the elementary aspects of “Bitcoin” and “Blockchain” in this post. “Bitcoin” first appeared in 2009, but they are much more prominent now, thanks be to better adoption by individuals and professionals. In this post, we more

  • Conflict Resolution at the Workplace

    Advances in Technology and Market Pressures have led to increasing expectations on growth and performance in our workplace. Expectations can rarely be met purely based on individual efforts. Successful accomplishment of organizational goals requires collaboration and team work. Goals have to be accomplished with a diverse workforce (based on age, culture, work-styles). This gives rise more

  • Definitions: What is “Deep web?”

    Coming close on the heels of my previous post –  “Dark web“, we will be defining “Deep web” in this blog post.  Similar to “Dark web“, the “Deep web” cannot be searched by traditional search engines as well. So, what is present in this “Deep web”, which sounds so similar to “Dark web”?  Here are more

  • Definitions: What is “Dark web”?

    “Dark web” which is not to be confused with “Deep web” is that part of the web which cannot be accessed by traditional search engines likes Google, Bing or Yahoo. In addition to this, it can only be accessed by special browsers like ‘Tor – the Onion router’ or ‘I2P'(Invisible Internet project). The “Tor router” more

  • Who talks more?

    ….Men or Women? 🙂 Yes – I know, I know –  the answer seems to be pretty obvious about who is more loquacious but still it piqued my interest to write about it… 🙂 However, it is to be noted – that there is no scientific reasoning behind my blog post – just  some honest more

  • Social media security!

    Continuously toying with a new idea for the technical blog post for several weeks, I couldn’t help but post about “Social media security” finally! We live in an era where “sharing is caring” and the more we share with our friends and well wishers, the happier we are. Contrast this is to the time, when more