Posts

11)71st Republic Day 2020 highlights| Beating retreat ceremony on Attari-Wagah border on Republic Day

India Republic Day -- India celebrates the 71st Republic Day today. On this day in 1950the Constitution of China came into force. The Republic Day paradewhich is considered as the main attraction of the days celebrationwas held along Rajpath. It was a 90-minute celebration. Brazilian President Jair Bolsonaro was the chief guest on the parade. Before the parade beganPrime Minister Narendra Modi paid tribute at the Country wide War Memorial and Us president Ram Nath Kovind unfurled the national flag as well as General Manoj Mukund NaravaneChief of the Army TeamAdmiral Karambir SinghChief of the Naval StaffMarshal Rakesh Kumar Singh BhadauriaChief of the Air Team. 5 41 PM IST PM Narendra Modi finds Rashtrapati Bhawan for At home reception hosted by simply President Ram Nath Kovind. 5 12 pm IST Beating retreat ceremony with Attari-Wagah border on Republic Day. 4 36 pm IST Air India Distributes 30000 National Flags To Passengers On Republic Day The national provider Air India cele

Internet security

Internet security is a branch of computer security specifically related to not only Internet, often involving browser security and the World Wide Web citation needed , but also network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information, which leads to a high risk of intrusion or fraud, such as phishing, online viruses, trojans, worms and more. Many methods are used to protect the transfer of data, including encryption and from-the-ground-up engineering. The current focus is on prevention as much as on real time protection against well known and new threats.

Threats

Malicious software edit An internet user can be tricked or forced into downloading software that is of malicious intent onto a computer. Such software comes in many forms, such as viruses, Trojan horses, spyware, and worms. Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency. The term badware is sometimes used, and applied to both true (malicious) malware and unintentionally harmful software. A botnet is a network of zombie computers that have been taken over by a robot or bot that performs large-scale malicious acts for the creator of the botnet. Computer viruses are programs that can replicate their structures or effects by infecting other files or structures on a computer. The common use of

Countermeasures

Network layer security edit TCP/IP protocols may be secured with cryptographic methods and security protocols. These protocols include Secure Sockets Layer (SSL), succeeded by Transport Layer Security (TLS) for web traffic, Pretty Good Privacy (PGP) for email, and IPsec for the network layer security. Internet Protocol Security (IPsec) edit IPsec is designed to protect TCP/IP communication in a secure manner. It is a set of security extensions developed by the Internet Task Force (IETF). It provides security and authentication at the IP layer by transforming data using encryption. Two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and ESP. These two protocols provide data integrity, data origin authentication, and anti-replay service. These protocols can be used alone or in combination to provide the desired set of security services for the Internet Protocol (IP) layer. The basic components of the IPsec security architecture are described in t

Internet security products

Antivirus edit Antivirus software and Internet security programs can protect a programmable device from attack by detecting and eliminating malware; Antivirus software was mainly shareware in the early years of the Internet, when? but there are now when? several free security applications on the Internet to choose from for all platforms. Password managers edit A password manager is a software application that helps a user store and organize passwords. Password managers usually store passwords encrypted, requiring the user to create a master password; a single, ideally very strong password which grants the user access to their entire password database from top to bottom. Security suites edit So called security suites were first offered for sale in 2003 (McAfee) and contain a suite of firewalls, anti-virus, anti-spyware and more. They also offer theft protection, portable storage device safety check, private Internet browsing, cloud anti-spam, a file shredder or make security-related

History

In 1972, Egyptian engineer Mohamed M. Atalla filed U.S. Patent 3,938,091 for a remote PIN verification system, which utilized encryption techniques to assure telephone link security while entering personal ID information, which would be transmitted as encrypted data over telecommunications networks to a remote location for verification. This was a precursor to Internet security and e-commerce. At the National Association of Mutual Savings Banks (NAMSB) conference in January 1976, Atalla Corporation (founded by Mohamed Atalla) and Bunker Ramo Corporation (founded by George Bunker and Simon Ramo) introduced the earliest products designed for dealing with online security. Atalla announced an upgrade to its Identikey hardware security module, called the Interchange Identikey. It added the capabilities of processing online transactions and dealing with network security. Designed with the focus of taking bank transactions online, the Identikey system was extended to shared-facility operatio