Dark Web

In the last part of the 1990s, two examination associations in the US Department of Defense drove endeavors to create an anonymized and encoded network that would ensure the touchy interchanges of US spies. This mysterious organization would not be known or available to customary web surfers. Reality with regards to the dull web is…

The strategies of a password

ABSTRACT Passwords are a critical component of data and network security. Passwords are the most common way to protect user accounts, but a poorly chosen password can put the entire network at danger if it is compromised. Many users are unaware of the importance of strong passwords and password management in information systems. We’re safe…

OTT and Censorship

Over The Top (OTT) platforms have become a paradise for content creators these days, and especially during this pandemic, when several content creators decided to distribute their content on these OTT, and have always received an overwhelming response. OTTs are streaming services that deliver audio and visual content to their platform over the Internet. These…

CYBER STALKING

With the amount of online presence that we have today, it is extremely easy for stalkers to use the Internet to stalk you. Cyberstalking sure is a sad and creepy part of modern society. Let’s take a closer look at how to recognize it, prevent it, and what to do if you find yourself on…

Cyber Resilience

Cyber resilience is the ability of online systems and softwares to restrict harmful malware that might affect the working of and handling of data online. It is basically the ability to quickly react and prevent cyber crimes that are important in today’s time. Number of cyber attacks on various countries like USA, India have increased…