Author: Ranjit Rajan

Documentary film

Documentary film

A non-fictional motion picture planned to essay some aspect of reality, mainly for the purposes of tutoring or maintaining a historic record. Originally shot on the typical medium earlier, now includes both digital and video productions which can either be direct to video, completed into a TV show or released in cinemas. It is labeled…

Read More Read More

Heartbleed a Security Bug

Heartbleed a Security Bug

Heartbleed a Security Bug Cryptographic software library which contains the prevalent OpenSSL has been threatened by severe susceptibility known as The Heartbleed Bug. This can cause theft of information which would otherwise remain confidential in normal cases by the use of encryption i.e. SSL/TLS for protection on the Internet. SSL/TLS offers communication privacy and security…

Read More Read More

Computer virus

Computer virus

Computer virus A Program or a part of code that is encumbered onto a computer without the knowledge of the person who owns the computer, such program is known as a computer virus. All the computer viruses are codes written by certain individuals. Viruses are capable to create a duplicate of itself, such kind of…

Read More Read More

Denial of service attack

Denial of service attack

Denial of service attack When a large number of collaborated system attacks a solo target, it causes denial of service for users that are exists in the under attack system. The overflow of incoming message to the attacked system basically causes it to shut down. This is known as distributed denial-of-service [DDoS]. Typically in DDoS…

Read More Read More

Whatsapp – Pro’s and Con’s

Whatsapp – Pro’s and Con’s

Whatsapp, founded in 2009 has emerged as the largest messaging platform across the world. Whatsapp was founded by Brain Acton and Jan Koum, They were the former employees at Yahoo.  Initially only the Android platform was targeted during development of Whatsapp, but then other platforms like Windows, Symbian, iOS, Blackberry OS were also developed to…

Read More Read More

Types of Web Hosting

Types of Web Hosting

Shared Hosting: In a shared hosting your own website and other website owners share one server. This encompasses sharing the physical server and the software applications that are on the server. Shared hosting services are economical because the cost to run the server is mutual borne between you and the other owners. However there are…

Read More Read More

Black box

Black box

In Melbourne, Australia the Aeronautical Research Laboratories scientist Dr. David Warren was the person who invented the “Black Box” flight data recorder. He was the main person to conceive of the idea of recording the flight crew’s conversation on an airplane and of guarding that recording in the event of a crash or fire. The…

Read More Read More

Is your password Secure?

Is your password Secure?

A password is an unspaced arrangement of characters used to regulate that a computer user requesting access to a computer system is really that specific user. Generally we know that users of a multiuser or securely protected single-user system claim a unique name (often called a user ID) that can be usually known. To verify…

Read More Read More

All about Domains

All about Domains

Domain names are used to recognize one or more IP addresses. Let us take an example, the domain name yahoo.com represents about a half-dozen IP addresses. Domain names are used in URLs to classify particular Web pages. For example, in the URL http://www.tecsys.in/ the domain name is tecsys.in. Every domain name has a suffix that…

Read More Read More