Menu
February 3, 2017 by
Cryptography Cryptography is the art and science of protecting information from undesirable individuals by converting it into a form non-recognizable by its attackers while stored and transmitted. Data cryptography mainly is the scrambling of the content of data, such as text, image, audio, video and so forth to make the data unreadable, invisible or unintelligible during transmission or storage called Encryption.… Read more... 
3 views 0 likes
February 3, 2017 by
    Perfect for small & standard websites and blogs. Comes with cPanel, PHP, Apache and more   Perfect for small & standard websites, blogs, etc. Comes with Plesk, ASP, IIS and more         Start your hosting business today. Comes with free WHM, cPanel and WHMCS   Start your hosting business today. Comes with free Plesk and WHMCS   For larger websites and apps ...
8 views 0 likes
February 3, 2017 by
Internet of Things - Three challenges and unlimited potential in future.   The Internet of things (IoT) is the inter-networking of physical devices which has abilities to collect and exchange data. Examples for IoT’s are, vehicles, buildings, day to day electronic devices, and other items embedded with electronics, software, sensors and network connectivity. Philip N. Howard, a professor and author, writes that the Internet of things offers immense potential for empowering citizens,… Read ...
1 view 0 likes
February 3, 2017 by
Symmetric key algorithms I will try to keep this article regularly updated and try to cover all major Symmetric-key algorithms, Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a simple transformation to go between the two keys. The keys, in practice,… Read more... 
3 views 0 likes
February 3, 2017 by
Shared Hosting  Linux Shared Hosting Perfect for smaller websites and blogs. Comes with cPanel, PHP, Apache and more  Windows Shared Hosting Perfect for smaller websites, blogs, etc. Comes with Plesk, ASP, IIS and more Servers  VPS For larger websites and apps that require dedicated hardware, at a cheaper price  Dedicated Servers Dedicated hardware and rock-solid performance; perfect for larger websites and apps  Windows D...
4 views 0 likes
February 3, 2017 by
Phishing, What is Phishing? Phishing is a kind of identity theft which is growing in popularity among hackers. It's an attempt to obtain sensitive information such as Email address, usernames, passwords, Phone numbers, credit card details and any personal details which is often used for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. Spam we receive on… Read more...
2 views 0 likes
February 3, 2017 by
Registration Register a Domain Book your domain here Bulk Domain Registration Bulk Registrations at lower rates New Domain ExtensionsNew Pre-register to get the name of your choice Sunrise Domains Register domains using your trademark name Premium Domains Register catchy, popular Domain Names IDN Domain Registration Book your internationalized domains here Transfer Transfer your Domain Move in your e...
4 views 0 likes
February 3, 2017 by
Kaspersky OS. The new operating system has been in development for last several years and has chosen to design there own Unix flavor rather then relying on Linux. Kaspersky OS makes its debut on a Kraft way Layer 3 Switch, CEO Eugene Kaspersky says in his blog post, without revealing many details about its new operating system.  Ream more..
1 view 0 likes
February 3, 2017 by
 Business Email Simple and powerful webmail.  Enterprise Email Advanced and Corporate-class email.  SSL Certificates Powerful encryption for your data.  SiteLock Over 5000 websites get attacked everday. Get SiteLock and secure your website from hackers, viruses and malware.  Codeguard Website Backup Your data is precious. Secure your website in just a few minutes
4 views 2 likes
February 3, 2017 by
FireEye iSIGHT Intelligence in Windows Defender "Fire-eye has invested in nation-state grade threat intelligence, and we are strategically partnering with industry leaders to operationalize this high-quality Intel," Ken Gonzalez, Fire-eye's Vice President of Corporate Development, said in the official press release. Read more...
1 view 0 likes
January 26, 2017 by
" OM AIM HREEM KLEEM CHAMUNDAYE VICHAY " The worship of Goddess Durga removes the effect of all types of black magic, unfavourable effect of negative planets, Bad luck, health problems, problems due to enemies etc.   The meaning: Navarna Mantra is the bija mantra of all three Divine Mothers, Maha Kali, Maha Lakshmi, and Maha Saraswati. So it embodies all three Mothers. The Mantra is OM AIM HREEM KLEEM CHAMUNDAYE VICHAY . Swamiji provides a beautiful explanation for the mantra. Aim i...
807 views 4 likes
February 3, 2017 by
INFRASTRUCTURE Datacenter Details Hosting Security 24 x 7 Servers Monitoring Backup and Recovery SUPPORT View Knowledge Base Contact Support Report Abuse
4 views 3 likes
February 3, 2017 by
DDOS What is DDOS? Why do we hear so often nowadays? Denial-of-service attacks, It's been classified as “cyberattacks,” have been used by perpetrators since the mid-1980s. Aimed primarily at specific sites and networks, denial-of-service attacks block the access of legitimate users, rendering the entire site or network unavailable. Denial of service is typically accomplished by flooding the targeted machine or resource… Read more... 
1 view 0 likes
January 26, 2017 by
Suban'Allah means Glory to God -- this phrase is often used when praising God or exclaiming awe at His attributes, bounties, or creation. It can also be used as a phrase of exclamation (ie. "Wow!"). Subhan'Allāh (Arabic سبحان الله) is an Arabic phrase often translated as "Glorious is God." SubhanAllah is "Glory be to Allah". Examples: Subhan'Allah, it's amazing how the Northern Lights appear on the horizon! Masha'Allah means As God has willed -- this phrase is used when admiring or ...
4 views 3 likes
February 3, 2017 by
Bhagavad-gita As It Is: bhagavad gita yatharoopa kannada A book in Kannada Bhagavad-gita Yatharupa Translated from English Bhagavad-gita As It Is by His Divine Grace A.C. Bhaktivedanta Swami Prabhupada. Published by The Bhaktivedanta Book Trust, Bangalore. Download Free book:  https://www.iskconbangalore.org/wp-content/uploads/2016/04/bhagavad-gita-yatharoopa.pdf
3 views 2 likes
February 3, 2017 by
Best Tips To Secure Your personal computer Below are the high level recommendations from AJARR to secure your personal Computer or Laptop, Stay up-to-date with Windows or any other OS software patches and updates. Use Anti-virus Software keeping updates current updates and Scan in regular intervals. I recommend scheduling automated scans. Use Anti-Spyware Software keeping current updates and Scan in regular intervals. I recommend scheduling automated scans.  Read more...
2 views 0 likes
January 26, 2017 by
Adi Sesha Ananta sayana  Srinivasa Sri Venkatesaa. ( 2 )  1. Raghukula tilaka Raghu Ramachandra  Seetapate Sri Ramachandra. ( Adi )  2. Yadukula Bhushana Yashoda nandana  Radhapate Gopala Krishna. ( Adi )  3. Kundali Bhushana Kailasa Vaasa  Gaureepate Shiva Shambo Shankara. ( Adi )  4. Sagara Lankana Sri Rama Duta  Anjaniputra Sri Anjaneya. ( Adi )  5. Swetambaradara Sri Chitwilasa  Shiridipate Sri Sai Natha. ( Adi )  6. Kaliyuga Deva Karunincha raavaa  Mangapate Sri Venkatesa. ( ...
3 views 3 likes
February 3, 2017 by
Ranting about Computer Security Computer security, also known as IT security is to protect information systems in any means and it’s a broader topic to discuss which will cover multiple terms, methods, topics, technologies. Computer security or IT security or cyber security is very important nowadays due to increased dependency on computer systems and internet connected devices. Currently, most of the electronic devices such… Read more... 
1 view 0 likes
February 3, 2017 by
Session Hijacking Session Hijacking is a serious risk issue today which is exploited in many different ways and it is really important to understand on how important it can be in this modern cyber days. What is Session Hijacking? In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session… Read more...
4 views 0 likes
January 29, 2017 by
What we can call Hindu GOD names in IT world.   Brahma: “System installer”   Vishnu: “System operator”   Shiva: “System programmer”   Narada: “Data Transmitter”   Yama: “Deleter”   Apsara & Rambha: “Virus”   Ganapati: “Anti virus”   Hanuman: “E-Mail”   Chitragupta: “Hard Disc”   Saraswati: “Google"   Parvati: “Mother Board”   Lakshmi: “ATM” 😊😝😝
13 views 0 likes
February 3, 2017 by
Recommended Browser Settings Configuring browser settings is a critical step in using Internet securely and also many of the vulnerabilities we find today will be while browsing internet. Most of the popular browsers include built- in security features, but users often fail to optimize their browser’s security settings on installation because majority of security features are not enabled with default installations. Failing to… Read more... 
6 views 0 likes
February 3, 2017 by
Increased use of powershell in attacks During maware creations, attackers are increasingly leveraging tools that already exist on targeted computers. This practice, often referred to as “living off the land”, allows their threats to blend in with common administration work, leave fewer artifacts, and make detection more difficult. Since Microsoft PowerShell is installed on Windows computers by default, it is an ideal candidate for attackers’ tool… Read more... 
4 views 0 likes
January 29, 2017 by
22 Reasons To Believe ancient Bharat Is Based On Science                ಮರಗಳು People are advised to worship Neem and Banyan tree in the morning. Inhaling the air near these trees, is good for health.           ಯೋಗಾಭ್ಯಾಸ If you are trying to look ways for stress management, there can’t be anything other than Hindu Yoga aasan Pranayama (inhaling and exhaling air slowly using one of the nostrils).              ಪ್ರತಿಷ್ಟಾಪನೆ Hindu temples are built scientifically. The place...
9 views 0 likes
February 3, 2017 by
Google Chrome Browser Settings 1) Open Chrome, top right, select more and then Settings. Read more... 
2 views 0 likes
February 3, 2017 by
OSI protocols list Major Protocols segregated in each OSI layer, 7. Application layer NNTP SIP SSI DNS FTP Gopher HTTP NFS NTP SMPP SMTP SNMP Telnet DHCP Netconf 6. Presentation layer MIME XDR5. Session layer Named pipe NetBIOS SAP PPTP RTP SOCKS SPDY 4. Transport layer TCP UDP SCTP DCCP SPX 3. Network layer IP IPv4 IPv6 ICMP IPsec IGMP IPX AppleTalk X.25… Read more... 
2 views 0 likes
January 31, 2017 by
Being male is a matter of birth. Being a man is a matter of age. But being a gentleman is a matter of choice. Never let your emotions overpower your intelligence Givers have to learn to set limits because takers don’t have any. Dream big and dare to fail. At least mosquitoes are attracted to me. Do you know what would look good on you? Me! Unless you try to do something beyond what you have already mastered, you will never grow. Either you run the day, or the day runs you. The...
16 views 4 likes
February 3, 2017 by
Microsoft IE & Edge Browser Settings Follow this guide on setting up Internet Explorer for the best and more secure way to browse, Below 10 steps will cover most important security features which will avoid majority of threats during our day to day browsing.Note - Upgrade and check for updates frequently. Many times Microsoft will release bug fixes frequently to fix identified threats and vulnerabilities. 1)… Read more... 
2 views 0 likes
February 3, 2017 by
OSI reference model One of the most important networking concepts to understand is the Open Systems Interconnect (OSI) reference model. This conceptual Model, created by the International Organization for Standardization (ISO) in 1978 and revised in 1984, describes a network architecture that allows data to be passed between computer systems. OSI model and describes how it relates to real-world networking. It also examines… Read more... 
1 view 0 likes
February 2, 2017 by
The Jesus Prayer is one of the oldest of Christian prayers, dating in its original form to the words the two blind men cried out to Jesus in Matthew 20:31. It was formalized by the Orthodox Churches in the 5th century. Lord Jesus Christ, Son of God, have mercy on me, the sinner. check video: https://atfunky.com/view/v/play/p-23/
1 view 3 likes
February 3, 2017 by
A back-door was found in thousands of phones in several models of Android mobile devices A backdoor was found in thousands of phones in several models of Android mobile devices, Security firm Kryptowire has uncovered a backdoor in the firmware installed on low-cost Android phones, including phones from BLU Products sold online through major vendors. The back-door software was discovered on the BLU R1 HD, sent data about the phones and their users’ activities back… Read more...
2 views 0 likes