Datacyper

  • Facebook
  • Twitter
  • Google Plus
  • Frontend
    • Java Script
      • Angular
  • Backend
    • Python
      • Flask
    • Java
    • PHP
  • Database
    • MySql
    • Database Management System
  • Deployment
  • Web Services
  • Cyber Security
    • Cryptography
  • Digital Marketing
  • Trending
    • Apache POI

Category - Security

  • Artificial Intelligence
  • Computer Network
  • Data visualization
  • Network Topology
  • Operating System
  • Security
  • Technology
  • Trending

GREEN COMPUTING

9th February 2022
by Ashwini
15 min read
Add Comment

What Is Green Computing? Green computing, frequently known as green technology, is the energy-effective and environmentally salutary operation of computers and other computing bias and outfit. Green calculating organisations...

Continue reading

  • Cyber Security
  • internet
  • Network Security
  • Network Topology
  • Security
  • Technology
  • Trending

SECURITY ISSUES IN MOBILE AD HOC NETWORKS[MANETS]

8th February 2022
by Ashwini
13 min read
Add Comment

MANETs (Mobile Ad hoc Networks) are a type of mobile network that includes wireless mobile nodes for communication. These nodes self-organize in unpredictable and volatile topologies. In this situation, a wireless system that can...

Continue reading

  • Computer Network
  • Front end
  • internet
  • Network Security
  • Network Topology
  • Security
  • Technology

GIGABIT NETWORKING

5th February 2022
by Ashwini
13 min read
Add Comment

Computers and their peripherals (such as networks and disc drives) are becoming quicker by the day. Current CPU speeds of DEC Alpha and Pentium processors are far over 100MHz, allowing them to execute billions of instructions per...

Continue reading

  • Data visualization
  • Front end
  • internet
  • laptop
  • Machine Learning
  • Network Security
  • Security
  • Server
  • Technology

Crusoe Processor

4th February 2022
by Ashwini
13 min read
1 Comment

The microprocessor is at the heart of any computer, whether it’s a desktop or a mobile device. Microprocessors for desktop PCs are available from firms such as Intel, AMD, Cyrix, and others. There has never been a CPU...

Continue reading

  • Cloud Computing
  • Computer Network
  • Cyber Security
  • Front end
  • Frontend
  • internet
  • MsSql
  • Security
  • Technology

MIDDLEWARE TECHNOLOGY

3rd February 2022
by Ashwini
11 min read
Add Comment

“Middleware” is defined as “software that lies between an operating system and the programmes that run on it.” Middleware allows communication and data operation for distributed operations by acting as a...

Continue reading

  • Computer Network
  • Data Analytics
  • Data visualization
  • Front end
  • internet
  • Network Security
  • Network Topology
  • Security
  • Technology

IN-BAND ON-CHANNEL (IBOC) TECHNOLOGY

2nd February 2022
by Ashwini
10 min read
Add Comment

When using digital sidebands, in-band on-channel (IBOC) is a hybrid way of broadcasting digital radio and analogue radio broadcast signals simultaneously on the same frequency. The addition of the digital sidebands is more...

Continue reading

  • Computer Network
  • Front end
  • internet
  • IoT
  • Network Security
  • Network Topology
  • Security
  • tech news
  • Technology
  • Trending

ZIGBEE TECHNOLOGY

1st February 2022
by Ashwini
11 min read
Add Comment

There are various high data rate communication standards available in today’s communication environment, but none of them meet the communication needs of sensors and control devices. Even at lesser bandwidths, these...

Continue reading

  • Cloud Computing
  • Cloud Cryptography
  • Computer Network
  • Cryptography
  • Cyber Security
  • Network Security
  • Security

Cloud-based cryptography. Everything you need to know

25th January 2022
by Ashwini
10 min read
1 Comment

Instead of maintaining your own physical servers, cloud computing allows your company to leverage IT services offered over the internet. Amazon Web Providers (AWS), Microsoft Azure, and Google Cloud are three well-known cloud...

Continue reading

  • Ethical Hacking
  • Security
  • Technology
  • Trending

What is Ethical Hacking?

2nd July 2021
by Nikita Shingade
3 min read
Add Comment

To begin with, Ethical Hacking sometimes called as Penetration Testing. In addition, it is an act of penetrating into system to find out threats, vulnerabilities. Furthermore, they try to find it in those systems that...

Continue reading

  • Phishing
  • Ransomware
  • Security
  • Technology

What is Ransomware?

25th June 2021
by Nikita Shingade
4 min read
Add Comment

Ransomware is malware that a user or organization uses to deny access to files on their computer. They encrypt these files and demand a ransom payment for the decryption key. These malware place organizations in a position...

Continue reading

Newer Entries
Older Entries
Copyright © 2025. Created by Digitvilla. Powered by Digitvilla.
  • Frontend
    • Java Script
      • Angular
  • Backend
    • Python
      • Flask
    • Java
    • PHP
  • Database
    • MySql
    • Database Management System
  • Deployment
  • Web Services
  • Cyber Security
    • Cryptography
  • Digital Marketing
  • Trending
    • Apache POI
  • Facebook
  • Twitter
  • Google Plus