Even as the technology buzzword from 2022 seems to be “AI” and everyone is talking about it, learning about it or creating content about it(inclusive
Now, that we have seen the difference between security and privacy in our last post, let us see how we can implement security and privacy
We might have heard of the terms, security and privacy and might have thought that they might be similar. But are they similar or are
As I finally complete my BlogchatterA2Z this year, I want to ask you my readers , which is your favorite technical post on my A2Z
‘Prompt Engineering’ is again a new concept with the rise in AI models. It is that job that relates to generating perfect prompts so that
In the age of increasing privacy awareness, “Zero party data’ is a whiff of fresh air. Before we dive into Zero party data, let us
We have seen a lot of posts on AI…let us see some other details about AI. In this post we will talk about Strong AI
It is quite difficult to believe anything on the Internet these days. Is the content written on the net written by the author themselves? Is
We have already seen ‘Shift Left Security‘ in another post…now, it is time to discuss ‘Shift Left Privacy’ in this post… Privacy principles don’t stand
Now that we have seen a few AI posts, let us do a quiz to test our knowledge! ð This post is for alphabet ‘Q’
Now that almost everybody is using ChatGPT or some form of AI in their lives and it is a known fact that all AI models
Ask anybody in the tech domain and they will have a fair idea of what a LLM or Large Language Model. In the ever evolving
So, you are a content creator generating lots of useful content in the form of videos or blogs? You are happy with your subscriber count
No, these are not the hallucinations that one physically experiences in life…these are AI hallucinations… what are they? Let us see more in this post;
Ever since AI has barged onto the scene, we as human beings have insane requests. We want it to draw things that we are envisioning,
There is nothing to beat the thought of AI today. It seems to be enveloping our life in different types of content creation whether it
There might not be a field in the world that AI has not touched today. Cybersecurity is absolutely no exception here! There are many facets
We all know that there are businesses that are affected by the advent of AI. At this point of time, it is no secret whether
Have I told you how fleeting technology is? And how fleeting I am as well? ð Technology grows and morphs into new things everyday and
April comes and my blog becomes happy with increase in traffic and I am happy to write more for the BlogchatterA2Z Challenge !! ð So,
‘Sora’ is the text to video AI model and it is surely turning eyes and ears! AI is ruling the digital world and it is
This Valentine’s day, what else will I the privacy warrior talk about? “Love your data”! ð As the day winds down, here are some simple
My latest fascination and my passion seems to be “privacy” now! ð I am always fascinated by some new topic or other and I finally
January 28th is celebrated as ‘Data Privacy Day’ every year. This is to bring more awareness to privacy issues that are constantly rising in our
As the year 2023 comes to close, here is a list of the top five blog posts that you read on my blog this year:
Instagram is “the” app for pictures, videos, reels and much more… ð It is quite trendy for the youth of today and I think almost
Cryptography is the art of hiding information in transmit. It ensures that information which is sent by the sender is received as is by the
Well….what will it be? ð Any guesses? For anybody on the planet that doesn’t know yet – I have been a technical blogger since 2012
“Shift left” is a popular paradigm in application security which refers to “Shift left” security or “Shift left” testing. We will discuss “Shift left security”
I was again wondering what to write for the next post of BlogchatterHalfMarathon when this idea suddenly sprung by…:) – My Master’s degree story…here goes
DevSecOps is “development”, “security” and “operations” which is the current and upcoming practice of incorporating security at every phase of the SDLC(software development life cycle)
We have already seen what is meant by basic ‘Threat Modeling‘ in an earlier post… let us now see what is meant by Automated Threat
While ‘Threat Modeling’ is a vast topic and there are numerous sub-topics which can be discussed, here is brief post about the different aspects of
There is a new kid on the tech block and no, I think we have crossed the ChatGPT phase.. ð Enter ‘Threads’ from Meta and
‘World Password Day’ is celebrated on May 4th, 2023 and what better way to celebrate it than by following the rules given below to remain
Whatsapp maybe currently the most used tool online today. I think Whatsapp leads in having conversations with anybody and everybody! ð There are innumerable number
How many of us can say we weren’t bitten by the ‘Shark Tank India’ show while it was being aired? I know the current season
Cryptography always occupies a special place in my heart as I keep riveting back to to it repeatedly! ð Cryptography is the art of hiding
Did you know that there is something called ‘Pytm’ in the technical world? Read that word again – it is ‘Pytm’ and not Paytm! ð
Fundamental coding is not not too hard but a lot of code in massive projects is definitely prone to bugs and flaws. While nobody can
After writing a few posts, I thought of perking my blog posts with an InfoSec jumble! See if you can find the words in the
The teeny bopper generation is something else! They shun Facebook, Whatsapp and older social media platforms. Gen Z is the generation of kids/young adults born
If you are active on Twitter – you very well know what the above word means. Twitter’s iconic blue bird logo… Has been replaced like
By now, the whole world is chattering about ‘ChatGPT’, Bard and other AI chatbots. AI or ‘Artificial Intelligence’ is the concept that is powering these
ChatGPT and Privacy: ChatGPT is on everyone’s mind. Unless, you have been living under a rock, it is the latest in the technology that is
With the whole world inspecting and wondering how ChatGPT works(or how to make it work for them), I had to dive, do my research and
Even as the Sun has set on the year 2022, here are the best posts for the year 2022 on my blog! Would you like
In an increasingly private world, ‘Meta’ founder Mark Zuckerberg, on Tuesday announced new privacy updates for Whatsapp messenger. They are summarized below and they are
The privacy sector is rapidly evolving and new laws and regulations are constantly coming into effect all across the world to keep personal data safe.
It is quite amazing that cyber security dates have gained prominence in recent days…here are some important cyber security dates for any calendar year: January
Having written a lot of posts on Java for this entire month, what better way to round it off than do a few programs that
Java has numerous concepts and features. We have just touched a base on some of them such as Classes, methods, variables, Interfaces, Inheritance and more.
May be out of all the social media platforms that I truly like is “Twitter”. Why? – because there is no family around.. ð ð
We have seen numerous posts on Java this month relating to Classes, methods, Inheritance, Interfaces, Access modifiers, Non-access modifiers , exceptions and more. While many
We have already seen Arrays in an earlier post…to recap, an array is used to store homogenous elements at fixed locations. Two dimensional arrays are
The String Class in Java is one of the important classes in Java. The String Class is considered to be an Object in Java. Strings
We have already read about ‘Exceptions’ in an earlier post. To recap: Exceptions are certain error conditions which arise in a program. These error conditions
I have written about 12 posts about Java for this month’s BlogchatterA2Z and what better way to understand it than by doing a short quiz?
Maybe the true sense of studying Java is to understand the various ‘Object oriented programming’ concepts coming into play. Apart from the fundamental definitions of
After having discussed a lot about arrays, inheritance, interfaces and access and non-access modifiers in Java, there is still one concept of Java that we
We have already seen the public access modifiers such as private, public, protected and default in an earlier post. We have also seen the ‘final’
After barreling through a lot of advanced concepts in Java, here is a another often confused and puzzling one – the ‘this’ keyword…:) Keywords in
We have seen the major access Java modifiers such as public, private, protected and default. But did you know that there are other modifiers in
We will discuss two important concepts in Java – inheritance and interfaces. ‘Inheritance’: Inheritance as the name suggests is inheriting the class functionality of a
We cannot proceed with the discussion of Java without discussing an important concept and that is of ‘Arrays’. We have already spoken about the different
Most of us think of ‘Google’ only as a search engine. You put in a search phrase in the ‘search box’ and it spits out
What happens when there is any problem in our life? We try to fix it…:) similarly, when there is a problem in our Java program
We have already seen a brief introduction to ‘Java modifiers’ in the ‘Basic Java concepts‘ post. As we have already mentioned, there are four access
As already stated, Classes contain the blueprint for an Object. Each Class has variables and methods. One important point before we start exploring more about
Before diving headfirst into Java, here are a few basic Java concepts that one should know. First, we will see the structure of a Java
Java was one of the first programming languages that I worked with long ago. It took the world by storm in the year 1995 and
I think I did the BlogchatterA2Z challenge in 2018 for the first time and thoroughly enjoyed it that time. Since then, I have been doing
Bangalore or Bengaluru is one of the few cities in India that is highly tech driven. We have apps for almost anything and everything. From
No sooner had I discovered Wordle about a month back, than I was hooked onto it…I could sit up past midnight normally, and now I
No story of any successful IITian is complete without a description of the coaching centre they went to. So, here is a summary of my
Today is January 28th, 2022 and what better day to write about IAPP certifications that today! ð With umpteen number of social media platforms and
With the year 2021 slipping into history, these are some of the posts that I enjoyed writing on my blog this year… Hope you enjoy
The Internet is ablaze with talk about the Log4j vulnerability. Here are a few details that have been understood about the vulnerability so far:
Did you know that October is cyber security awareness month? ð Yes..it is a month solely dedicated to talk a lot about cybersecurity… ð Here
Ask anybody who is writing for their own blog and they will say that their life is the best! ð Why? Here are some reasons,
Passwordless authentication: How many of us are tired of remembering multiple passwords all the time? How many of us are guilty of reusing passwords or
Is it existent? ð Yes…it is but you have to look and listen very, very carefully though….:) Let us first analyze how the Indian languages
CCPA is ‘California Consumer Privacy Act’ that came into effect in 2018. It is yet another privacy regulation similar to the GDPR. However, CCPA tries
Move over college life…welcome to work life! (atleast an internship) The son sat in his suit all dressed and prim and proper preparing for his
“The art of communication is the language of leadership” – James Humes This quote by James Humes probably summarises the communication skill concept very well.
Facebook is now an old social media platform. It has personal memories and professional memories for many individuals through the years. Now let us see
Cryptography is yet another domain of the CISSP exam which is exciting and fascinating. I have already written several posts on Cryptography on my blog(Caesar
By now, most or all of us might have heard about ‘Pegasus’ the spyware that was used to spy on about 50,000 journalists from all
Close on the heels of my search for privacy based sites and tools, I stumbled upon Swisscows which is a “data secure” privacy-focused search engine.
Welcome to another post related to competitive programming! This post is in continuation to my earlier post “Competitive Programming and Time Complexity” which you can
Title : Windows 10 Simplified Author: Anand Narayanaswamy About the author: Anand Narayanaswamy works as a freelance writer and is based inThiruvananthapuram, Kerala. He has
With hacks and breaches continuing in spite of all countermeasures, a new type of security model had to be created such that it thwarts further
I had written about the differences between HTML and XML in last years Blogchatter’s A2Z ‘X’ post…this year, I am writing about a similar topic
‘VirusTotal’ is a site that analyses and checks suspicious files and URLs to detect malware. This is then shared with the security community. Here are
With Whatsapp policy updates shaking the online world in January 2021, the whole of my digital world seemed to be moving towards other social media
Rather than write another robotic post about my favorite tech posts, here is a ‘Word Search’ that I loved creating… ð with my favorite tech
There are a number of programming languages like C, C++. Java and the more recent one like Python. ‘Rust’ is another programming language that is
What better thing to write about for letter ‘Q’ than a ‘Quiz’! ð Here is a simple quiz on the posts that I have written
Quick on the heels of my previous post which dealt with the ‘Opera’ browser, this post talks about yet another privacy browser called ‘Brave’. As
Browsing the Internet has come a long way. From Netscape Navigator to Internet Explorer to Google Chrome the browser world has come a long way.
I was introduced to ‘Medium.com’ by the same person who introduced me to writing! (thank you, it is a fun site! :))Most of my writer
I have been into programming and tech from the age of 15, thanks be to my father! Initially, I got into it, only because my
As I was wondering what I should write for alphabet ‘J’ for #BlogchatterA2Z 2021, I hit upon an idea…:) Why not a puzzle to keep
‘Internet Protocol’ addressing or ‘IP’ addressing gives each device on the Internet an address and location. The address can be represented in IPv4 format or
Close on the heels of yesterday’s GDPR post, is another post on privacy. This post deals with privacy of health information of individuals. HIPAA or
Who has your name? Who has your phone number? Who has your location information? If you are worried about all these questions and more, then
Facebook needs no introduction. It is one of the oldest social media platforms that has spawned several other social media platforms and a social media
Have you heard about Clubhouse? If you haven’t heard about it, here are a few details about the app which made headlines when Elon Musk
After security and programming, I love cars!! ð I admire the different makes and colors and features of the different cars. I always wonder if
I got the One Trust Privacy Professional certification and am all excited!! ð How do we get it? Professionals who seek to get the One
As 2020 has rolled away into oblivion, here are the best posts on my blog according to traffic: Would you like to read them again?
Welcome back! In my previous posts on machine learning, I had talked about univariate linear regression, in which a continuous “target” variable was predicted on
Here is another quiz that involves technology, blockchain and Information security! Do take it and give me your feedback!
“Change is the only constant” is a highly popular and true saying that is liberally splashed all around. It is however very true for the
From the days of writing about ‘social media outcasts‘ to ‘ What is your social media personality‘, I have come a long way. Now, I
Here is a fun InfoSec Quiz for beginners in Information Security! Have fun doing it! ð This is the sixth post for @Blogchatter’s #MyFriendAlexa
We all know Mr. Google… he helps us through our highs and lows…(hopefully! :)) But there were some amazing things about Google that I came
Disclaimer: This is not a tech post…but rather about a very tech person and my observations about him/her for a period of time… In 2018,
‘Security’ as I see it is omnipresent in our lives. We may not have an excessive interest in it or even feel that it
Are you a person who cannot be convinced easily? Well, don’t worry – if you are doing most of your work online, somebody has convinced
In these COVID times, even as humanity is struggling with many things, there are many others who are trying to make quick money. One of
Welcome again! This is a continuation of my previous post about gradient descent. In this post, I will talk about the learning rate, and show
Welcome back! In the previous post, I had talked about univariate linear regression, and defined the cost function as: Here m denotes the number of
Welcome back! This is in continuation to my previous post “Machine Learning: Introduction”. In this post I will discuss the problem of univariate linear regression,
Recently I completed a course on the topic of ‘Machine Learning’, and I would like to share some of the things I learnt from the
I recently achieved the ‘Certified Blockchain Expert’ from Blockchain Council and here are some of the details of the exam. After drowning in Information security
‘Competitive programming’ is nowadays popular among many coding enthusiasts over the world (including me). It is the skill of designing and implementing efficient algorithms (through
What is the most talked about or used app today? It is ‘Zoom’!! With ‘Work from home’, ‘Study from home’, ‘Art from home’, ‘Yoga from
From being a total social media outcast, I can safely say I have come a long way! ð I am moderate social media user today
HTML and XML have been around for a long time now. Most of us would have heard of HTML. It is there since the beginning
Disclaimer: Many of you might be knowing this simple hack, but this write up is just for people who might not know… With the current
With most of the world rolling in Windows and Linux, chances are you would have heard of the ‘UNIX’ operating system only in print. I
Is the job of an Information security professional a recession proof job? Even in these COVID times, an Information security professional seems to have their
The world and its citizens might be fixated on the Coronovirus and its effects, but there are malicious people doing their online nefarious activities as
‘Phishing’, ‘Spear phishing’ are some common hacks in the Information security domain. While ‘Phishing’ scam is something that many of us might have heard about
I moved into the Information security domain after having worked with many programming languages. I have worked with dinosaur programming languages like BASIC, FORTRAN, C,
In the tech world, ‘Machine Learning’ and ‘Artificial intelligence’ or AI have been buzzwords for quite a while now. Let us see a brief overview
I had already blogged about ‘Cryptography’ in a post long ago…to recap: Even though different cryptographic algorithms are created for secure communication between the sender
A couple of years back, Java was considered one of the most popular programming languages, but recently Python has also gained popularity as well. As
In this article, we will look at the final habit, which is “Sharpen the Saw”. Habit 7 surrounds the other six habits and is the
This post might be particularly more understandable to those in the Information security domain and the certification aspirants! ð Shon Harris: Shon Harris is the
I had already blogged about firewalls in an earlier post….to refresh one’s memory, a firewall is a hardware or software product that stands between the
There are several different types of security in the information security field. After all, it is not easy to protect each type of device without
‘Due Care’ and ‘Due Diligence’ are two concepts that might be more prevalent in the legal system but are also present in the Information security
The ‘Clark Wilson Model’ and the ‘Bell-LaPadula’ models are two examples of security models. Security models were created to implement the ‘Security policies‘. Recall, from
There is no better time to learn about the terms “Business Continuity” and “Disaster recovery” than in these COVID times. It is also easier to
Another April has come and it means another Blogchatter challenge! ð I will be doing this year’s Blogchatter challenge on ‘Comparison posts’ … read my
In this article, we will look at the next habit which is “Synergize”. Practice and Perfection of the first 5 habits is a pre-requisite for
In the previous article we looked at the 4th Habit, which is “Think Win Win”, which is to seek mutual benefit in all our interactions.
Even as the posts on my blog are mostly related to the technical aspects of Information security, here is a post that deals with the
This article is originally published in Albaron Ventures. In our quest to escape from existing corrupt centralized systems, we may believe that it’s possible to achieve complete decentralization.
Here are a few tips to maintain a good password hygiene:
Technology never ceases to amaze us, right? Just 5- 6 years back or maybe a decade back, we were trying to push every possible activity
Have you seen a small rectangular box filled with black designs in newspapers, movie tickets and shopping places(Paytm, PhonePe, UPI)? This is a QR code.
In the previous article we looked at the 3rd Habit, which is “Put First Things First”. It can be summarized as “Prioritize the Important Tasks”.
Capture the Flag, or CTF, refers to an information security competition in which contestants solve various tasks such as exploiting a webpage, reverse engineering some
This article is originally published in Albaron Ventures. As Bitcoin and other digital assets continue to grow in adoption and popularity, a common topic for
In the previous article we looked at the second habit, which is “Begin with the End in Mind”. The first habit (“Be Proactive”), says that
In article one and article two, we reviewed Covey’s 7 Habits of Effective people and the First Habit (Be Proactive). We understood how alignment of
Can you imagine peeping into your network and seeing the traffic come in and go see the applications on the net that are trying to
With Apple releasing the new iPhone 11 and its 13th major release of its mobile operating system, ‘iOS 13 on September 19, 2019’, it is
‘Certifications’? Ask this to any computer professional – and their eyes will surely glow… ð ‘certifications’ are available in every computer field – as an
Cars can be hacked, phones can be hacked, all smart devices can be hacked – so why not ATM machines? Scary isn’t it? This news
The 7 habits of highly effective people is a compilation by Stephen Covey of age old natural principles. Examples of natural principles are fairness, integrity,
“Artificial intelligence” or “AI” is a word that has been generously splashed all over and is omnipresent in our lives today and yet most of
It seems the online world is embroiled in some sort of controversy or the other giving me plenty to write about!! ð Jokes aside –
Cyberchrondriac: I am sure most of us have heard of the term “hyperchrondriac”. A “hyperchrondriac” is a person who is excessively worried about their health
Here is the second post on ArrayLists which is a continuation from part 1 . Here are some points covered in the first part: Main
Before beginning this post, I would like to state that this post assumes some prior knowledge of Java (particularly arrays, classes and objects, and overriding)
‘Sharenting’ – “What is that?” might be the thought for many of us…it was the same thought for me too and soon I was researching
Before beginning this post, I would like to state that this post assumes some prior knowledge of Java (particularly inheritance, using interfaces and overriding methods)
Did you know that the words ‘offensive’ and ‘defensive’ can be used in the InfoSec domain as well? If you follow my writings on Information
The ‘Information security’ domain is growing by leaps and bounds today. While it was in a negligible state of growth even 5 years back, it
Security has become an important component of every business. Many(if not all) organizations are choosing a proactive approach to security rather than a reactive one.
There must not be a soul in this planet who has not watched YouTube videos in this age! From small babies to older adults we
A little girl always fiddled with her mother’s smartphone and tried to crack the passcode or the pattern on it. She knew exactly what her
Recall the ‘Authentication‘ post ? Now we deal with two-factor authentication which is an extension to that post. Authentication in the information security realm is
‘SOC’ is the acronym for ‘Security Operations Center’. The 2018 Verizon DBIR (Data breach investigations report) states that there were 53,308 security incidents and there
“Red team – Blue team” is a popular parlance in the Information security domain. It actually imitates military tactics, ” red teams” and “blue teams”
“Privacy”, what? might be a common reaction for some of us. For me, of late, I have been getting more and more passionate about privacy
OWASP( ‘Open web application security project’) is a community and it is a non-profit organization that is primarily oriented towards securing software. Any type of
‘Identity management’ in some ways is an extension of the concepts of access control and authentication. The current business environment is complex and getting more
As I was toying with my next topic for my technical post in Information security, I bumped into this concept called ‘Identity chaos’ – my
Forensics is identifying, investigating and collecting evidence in a scene of crime. The information collected is then used for legal purposes. We extend this to
The Internet and social media have a very powerful grip on most of us today. Bill payment, shopping, connecting via social media, chatting, gaming –
We all have a life outside Facebook, Whatsapp, and Twitter – but we have forgotten the password for it’! ð goes the latest security quote
We have already discussed about Cryptography and Caesar cipher‘. In this post we will explore more about Cryptography by discussing the application of Cryptography –
Network and System Security means protecting your system from different kinds of attacks by unauthorized users. With the development of the Internet and the World
It just feels like we hear something new about cryptocurrencies everyday, but let us delve into the concept of ‘Cryptojacking’ in this post. Having blogged
Tesla’s Role in Evolution of Electric Cars Modern day private and public transportation are primarily based on non-renewable energy resources. These traditional forms of transportation
Do blogging/writing and blockchain have anything in common? Yes – with ”Steemit’. What is ‘Steemit’? It is a blockchain based blogging platform. Imagine writing a
The challenges of cloud computing are easily overshadowed by the fact that the market is going through a huge boom right now. The cloud computing
‘Physical security’ is an often overlooked aspect of the security. It is often ‘taken for granted’ and most organizations do not take it seriously. Danny
Cloud computing: the synergistic boardroom buzzword that you still pretend know about. Luckily, it’s a pretty simple idea, technically demanding, but simple none-the-less. On paper,
As our dependence on electronic devices increases, from ordering food to paying bills and hailing cab services and making use of online maps to travel
Like any other system, the global economy is susceptible to failure at many different points. Unfortunately, due to the interconnectedness of the world, an economic
It is a reality that the cyber security landscape is rapidly changing everyday. New threats emerge constantly and what was true 5 years ago might
In the wake of the Facebook data breach(Source: https://www.wired.com/story/facebook-security-breach-50-million-accounts/) that supposedly compromised 50 million accounts and other personal data last week, it is but imperative
No sooner had I written about maintaining a ‘minimum online presence’ on my Hacking post, I had several comments relating to that(either, ‘it was not
The Information security world is a deep one and sometimes it is quite shocking to know the things that can be done. Did you know that
The online world unfortunately is not a fun place as it seems. There are other types of people around too seeking to grab credit card
While ‘Information security’ always gives us images of breaches, hacks, stolen credit card numbers and bank account numbers, my blog has always been associated with
Just like Bitcoin, which is highly known, ‘Ethereum’ is yet another open source implementation of the Blockchain concept. However, the similarity between ‘Ethereum’ and ‘Bitcoin’
‘Smart Contracts’ is a term that is often used in the Blockchain world. ‘Smart Contracts are similar to legal contracts but are encoded in the
For those who would like to look deep into their networks and not just on the outside, “Wireshark – the network protocol analyzer,” is the
‘Ripple’ may be a totally unknown term to you or you know exactly what I am talking about – either way ‘Ripple’ is creating ripples!
Blockchain, AI and machine learning are the latest buzzwords in the IT industry. Building a blockchain is also becoming a need for various businesses. Recall,
My e-book on my personal experiences travelling from India to US and back has been published!! ð Buy it from Amazon today to read about
After having done numerous posts on Information security, here is another basic and elementary concept in Information security – ‘Cryptography’. The concept of Cryptography also
It was the month of March. There were cues for the BlogchatterA2Z challenge all around social media. I was suddenly tempted to participate – should
“Marketing Automation replaces separate systems for email, web visitor tracking, lead scoring, nurture campaigns, campaign management and reporting with one solution that streamlines marketing processes
In the Information security realm, there are different types of attacks occurring all over the world. There are virus attacks, phishing, worm attacks, DOS and
The twenties never seem to last forever. Body aches and lifestyle diseases catch up with us sooner than later. Exercise seems to be the only
In the Java programming language, a ‘variable’ is used to store a value. Different kinds of operations can be performed on the variables by means
Whether you are from the North, South, East or Western regions of India – there is a similar pattern that parents follow for naming their
VPN or ‘Virtual Private network’ is exactly what it states – it is a private and virtual connection to your corporate network. While it is
‘Information security’ in the broadest sense is the protection of information and assets from malicious elements. Individuals and organizations are both subjected to virus, ransomware,
Social media and privacy concerns go hand in hand. On the one hand, we love the reach of sharing our day to day moments, our
As I was pondering what to write for alphabet ‘R’ for my Blogchatter A2Z challenge, a recent conversation in my school Whatsapp groups – triggered
Have you seen a small jelly like fruit sold by street vendors with a delicious taste? This is the ‘Palm fruit’, Palm tree fruit’ or
‘Object oriented programming’ is a type of programming which involves object oriented principles like encapsulation, polymorphism and inheritance. These principles are implemented by means of
NIST stands for ‘National Institute of Standards and Technology’ and the NIST special (SP) publications act as a reference for organizations, academic institutions and government
‘Information security’ briefly is that branch of study that deals with securing data and identifying weaknesses in systems and sealing them. Anti-virus software, firewalls are
Even as the Block chain technology is in its nascent stages and everybody is trying to understand it – there are organizations which have started
Even as we grumble about the different types of pollution, is is quite ironic to note that “we” are the cause of the pollution! We
Blockchain, the technology disrupter and the decentralized shared ledger has four important points that essentially define it. They are: Consensus, Immutability, Finality, Provenance. This blog post
In a world, where girls play second fiddle to boys and boys are always the wanted “gender” – it is crucial to empower the girls.
But before we see what is Caesar cipher, let us have a brief understanding of Cryptography.From time immemorial, we are trying to make sure that
We have all encountered ledgers in our lives. We have our own personal ledgers for keeping track of transactions. But when the number of transactions
Technology is a fickle thing. The requirements change at the speed of light!(not exactly – but fast enough! :)) No sooner do we think that
This year I will be participating in my first ever ‘A to Z BlogChatter Challenge’. The challenge here is to blog everyday for the 26
We are already far into the New year and with it are coming new developments in cybersecurity. 2017 was an exciting year for the cybersecurity
Two terms commonly associated with methods in Java are overloading and overriding. These two concepts will be discussed in the following sections. Method Overloading Method
Automobiles have evolved rapidly in the last 30-40 years. This article reviews future trends of Automobiles. As we survey the current landscape of the automotive
Even as the concept of ‘Blockchain’ is bouncing off everyone’s radar and everyone is keen to know more about this trending topic – let us
I am sure this question might have appeared in other forums – but after writing innumerable blog posts, I am always curious as to what
After having dealt with a huge number of posts on Information security, I thought I will answer one of the fundamental questions about Information security
Introduction:” 22 bank accounts hacked, ₹5.3 lakh stolen in 48 hours” scream the headlines in a local newspaper (Source: http://www.thehindu.com/news/cities/bangalore/22-bank-accounts-hacked-53-lakh-stolen-in-48-hours/article22538891.ece)How did it happen? Two customers
‘Security policies’ are yet another aspect of Information security that is all around us – but we are hardly aware of it. We will see
‘Biometrics’ is gaining more recognition in today’s world – thanks be to popular organizations embracing it. What is ‘Biometrics’ and what are the different types
With the New Year upon us, it is but natural to write about my thoughts on the security trends that might shape 2018! ð So,
Introduction – reasons for good design: When we buy a new car, we may have a number of expectations. e.g. We would like the
With most of us(or is it ‘all’ of us?!) being being plugged onto electronic devices like cell phones, laptops, tablets, IPads all the time, it
As the year draws to a close, here are my best technical posts of 2017: Bitcoin and Blockchain: What next? 2. Cyber diplomacy: 3. What
It seems every other day has a new headline regarding ‘Bitcoins’. I am sure most of us give a casual glance at this word and
‘Malware’ is short form for ‘malicious software’. ‘Malware’ encompasses viruses, worms, Trojan horse, ransomware etc Examples of malware include: Wannacry ransomware Destruction produced by malware:
With social media becoming a permanent feature of most of our lives, it has been fun to observe the social media personalities of my
No sooner do we start looking for jobs in the InfoSec industry, we encounter the question “Do you have any certifications?” This post will delve
‘Whatsapp’ is India’s largest and most convenient chat app. The anonymity to send messages without the whole world to view it and the instantaneous way
I write and write about Indian and US life and I never get tired! ð Here is one more… Most of us who move to
When we moved to India, 7 years ago – the first thing that stumped me when we were looking for our kid’s admissions, were the
The more connected we are with our tablets, mobiles, desktops, laptops, the more we are susceptible to an attack. The connected world boasts of different
I always tell my kids to speak nicely and sweetly(not that either of them speak loudly or behave aggressively) but still maybe one of the
All professions have a retirement. Be it a doctor, engineer, lawyer, coder, developer, privacy analyst, infosec practitioner, trainer – all of them have retirement. Sometimes,