Datacyper

  • Facebook
  • Twitter
  • Google Plus
  • Frontend
    • Java Script
      • Angular
  • Backend
    • Python
      • Flask
    • Java
    • PHP
  • Database
    • MySql
    • Database Management System
  • Deployment
  • Web Services
  • Cyber Security
    • Cryptography
  • Digital Marketing
  • Trending
    • Apache POI

Archive - June 2021

  • internet
  • laptop
  • Technology

Dell Vs HP Laptop. Which is better – Dell or HP?

7th June 2021
by Arunshi Srivastava
6 min read
Add Comment

We are living in the 21st century which is fully technology-based. Being in the 21st century, the thing which is required by all is Laptop. This is something that has a very crucial part in the everyday working of everyone...

Continue reading

  • tech news
  • Technology
  • Trending

Should self-driving cars allowed in India?

7th June 2021
by Shruti Goel
2 min read
Add Comment

While the world is getting ready to commercialize self driving cars, India still stares at a long road ahead. In India, Traffic accidents are on the rise and the growing number of fatalities are a result of distracted driving...

Continue reading

  • Apps
  • Cloud Computing
  • Database
  • Web Services

Significance and Role of Hybrid Cloud

7th June 2021
by Drishti Patel
3 min read
Add Comment

Hybrid cloud is a mixed computing solution which combines private cloud services with public cloud like Amazon Web Services (AWS). Moreover, the main aim to combine these cloud is to create an automated and well manageable...

Continue reading

  • Cyber Security
  • Database
  • Ethical Hacking
  • Network Security
  • Security

Security Risks and Attacks on Web Applications

7th June 2021
by Drishti Patel
3 min read
2 Comments

In this article, we will learn about the most security risks and threats on web applications. Firstly, security risks refers to the potential damage that an attack on a web application could cause. Also, there must be a risk...

Continue reading

  • Security
  • Technology

How can we utilize technology to tackle Financial crimes?

5th June 2021
by Nikita Shingade
3 min read
1 Comment

Financial crime has been a major issue around the world for decades. Let’s see, how can we utilize technology to tackle financial crimes? We all know, according to the recent study, the cost of global financial crime is...

Continue reading

  • Artificial Intelligence
  • internet
  • Technology

AI AND ROBOTICS

5th June 2021
by Arunshi Srivastava
2 min read
Add Comment

Robotics is a domain in artificial intelligence that deals with the study of creating intelligent and efficient robots. What is AI? Artificial Intelligence (AI) is a wide-ranging branch of computer science concerned...

Continue reading

  • Cyber Security
  • Phishing

IS INDIA PREPARED ,TO MANAGE CYBER ATTACK?

5th June 2021
by Pooja Adiveppa Karagi
3 min read
Add Comment

Is India prepared ,to manage cyber attacks is one of the biggest question in all our mind .And how to our country manages to get out of it. Like every other country in the world, India is also under the pressure of cyber...

Continue reading

  • Cloud Computing
  • Cyber Security
  • Security
  • Technology

Role of Intelligent Process Automation

5th June 2021
by Drishti Patel
3 min read
Add Comment

Intelligent Process Automation is an application of artificial intelligence which includes cognitive automation, computer vision and machine learning. As we know artificial intelligence is an emerging branch of computer...

Continue reading

  • Cyber Security
  • Phishing
  • Uncategorised

HOW DO PEOPLE BECOME CYBER CRIMINALS.?

5th June 2021
by Pooja Adiveppa Karagi
3 min read
2 Comments

When we think of frauds, hacks every such thing people always wonder how do they become cyber criminals and how do they do such things so heartlessly. Now days the criminal activities related cyber are increasing day by day...

Continue reading

  • Cyber Security
  • Network Security
  • Security

What is Fileless Malware? How does it works?

5th June 2021
by Shruti Goel
2 min read
1 Comment

Fileless malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack. Unlike traditional malware, fileless malware does not require an attacker to install any code on a...

Continue reading

Newer Entries
Older Entries
Copyright © 2025. Created by Digitvilla. Powered by Digitvilla.
  • Frontend
    • Java Script
      • Angular
  • Backend
    • Python
      • Flask
    • Java
    • PHP
  • Database
    • MySql
    • Database Management System
  • Deployment
  • Web Services
  • Cyber Security
    • Cryptography
  • Digital Marketing
  • Trending
    • Apache POI
  • Facebook
  • Twitter
  • Google Plus