• Wireless security

    Look around you and you see everything has become wireless and more mobile than 10 years ago. Wireless technologies have seen increased growth as being tied to desktops, landline phones have become passé. We see laptops with Wi-Fi connectivity that gives one the ultimate freedom to do business or do casual browsing on the go. more

  • Why do we Tamilians not have a last name?

    Frankly, I have no idea!! 🙂 If you do please comment below… But I can share some thoughts regarding our first and last name business! While for most of the world specifying a first and last name is the easiest thing to do – it is not so for us who belong to one particular more

  • Intrusion Detection systems

      ‘Perimeter security’ is placing defenses around an organization’s perimeter thereby ensuring that an organization’s chances of being compromised are minimal. Some of the components that are used to ensure perimeter security are routers, VPN, IDS, IPS, firewalls and so on. We will see one type of perimeter security device the ‘IDS’ or ‘Intrusion Detection more

  • What is Steganography?

    Steganography is the procedure by which files or information can be transmitted secretly by embedding them in images or audio files. Cryptographic concepts can be used to supplement steganography by first encrypting the message and then hiding it in the image. For the ordinary user only an image is visible but to the sender and more

  • Don’t cry….

    ….just remain vigilant about security issues surrounding you! The ‘Wanna Cry’ ransomware is the talk of the world having affected 150 countries including India, Spain, Britain, parts of Europe and crippling 2,00,000 systems globally.

  • Definition: Risk analysis

    Risk analysis is a tool to implement risk management. Before we go onto see the definition of risk analysis, recall that a vulnerability is “weakness” in the system and the “risk” is the threat agent exploiting the vulnerability. Some examples of the three concepts working together are when a vulnerability like an unpatched application is more

  • Definitions: Top-down approach to security

    The top-down approach to security is when an information security program moves ahead with management approval. The appropriate security funding is secured and there is a proper plan and direction towards the program. This approach is more efficient and generates better results. In short, the top-down approach is a more active and serious approach to more

  • Firewalls!

    Irrespective of our profession we have all encountered the term “firewalls” in our life. We are all glued to our laptops or mobile devices and are constantly engaged in business or personal conversations all the time.  These digital and electronic conversations will sooner or later bring the malicious part of the Internet into play. We more

  • Password cracking!

    “Password” is the simplest and easiest way to authenticate a user. It is also one of the most easily understood ways to authenticate a user. Recall, that authentication is the process of uniquely identifying a user and making sure that “they are who they are”. The username and password combination is the defacto method of more

  • Introduction to Java

    We see programming languages all around our digital lives and there have been a few languages that have stood the trials and tribulations of time. Each language is created with a different purpose and sometimes, the whole motive behind it erodes with new technologies.