Global Wireless E-Voting is the newly proposed technique of this era to secure the dignity of voting. Everyone is aware of the presence situation of the voting procedures. Politics and corruption have prevailed everywhere. Though voting needs to be the impartial and fair procedure which outcomes the true desire of the Democracy. But unfortunately, we have come across various incidents where we have seen the improper use of voting machines. The whole control is kept in the hand of voting in charge officer. One more risk with the present voting machine is that anybody can increase the vote count since the count is present in the machine itself. [Read more…]
In this era, mostly every single one owns a computer or laptop. Though people use it for different reasons- some for their profession, some of playing games, some for surfing internet. But many people uses it to store their personal data. They do not want this personal data to be disclosed to anyone. Do not take my wrong, you dirty minds. This personal data can be their family pictures, their videos etc. [Read more…]
Every PC user keeps personal data in his PC. You feel insecure when you have to give your PC to someone else. But you can not say NO to your friends/others who want to use it on their face. By doing so, it will create a negative impression of you on them. Obviously, you are not supposed to do so. But that does not mean there is no solution to this problem. Today we are posting very important trick for your safety. It will help you to track the activities that someone has done on your PC behind your back.You can find what been used on your computer in your absence. [Read more…]
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information. Phishing also known as brand spoofing or carding, is a variation on “fishing,” the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting. It is also possible to phish for other information in additions to username and passwords such as credit card numbers, bank account numbers, social security numbers. The damage caused by phishing ranges from denial of access to e-mail to substantial financial loss. [Read more…]
Today, all of the people want their information and data to be secure. Even the devices we use are protected by passwords. In our daily life, we come across with different sectors where we need privacy. It can be frustrating trying to keep with all of the passwords and keys. Keeping this in mind, Dallas Semiconductor is developing a new Java-based, computerized ring that will automatically unlock doors and log on to computers. [Read more…]
Cloud computing is the boon for today’s world. For ones, who are oblivious to the term Cloud Computing, Cloud computing doesn’t mean computing over clouds. So, what is cloud computing? Check out what it actually mean and its models. Here, the term “cloud” mean “The internet” or “The Web”. The term “Cloud Computing” is dependent on cloud drawings used in past to represent telephone networks and later to depict the Internet in. “An emerging computer paradigm where data and services reside in massively scalable data centers in the cloud and can be accessed from any connected devices over the internet”.