Personal cyber security

AUGUST 06, 2016     Security    
  1393 views       0 comments

How often are you concerned about your personal security when it comes to sharing your personal and contact information? This is one of the hottest and trendiest topics in cyber security and personal security field these days. Every day we are hearing the stories of big companies and various applications using different security measurements like two-factor authentication, end to end encryption and many other techniques while there are many more news headlines about giant companies and famous application get hacked and the user data is stolen.

 

These news headlines get us thinking that aren’t those security measures there to protect our data against security breaches? Why the experts never foreseen these circumstances and prepare fall back strategies to protect the data and make it unreadable to others. Well the truth is, most of the times those who call themselves experts, cannot foreseen all the possible breaches and provide strategies and methods to prevent the possible vulnerabilities.
The most common methods these days apply to the applications and systems is the two factor authentication to prevent the breach of personal password and unauthorized login to personal or work accounts and the second most used method is end to end encryption which makes it impossible for the others who are tracing network packets and intercept the network traffic to decode the content and messages.

Read More...

Safely using external libraries and plugins

APRIL 26, 2016     Developer Tips    
  1502 views       0 comments

Nowadays there are many frameworks, libraries and plugins available to developers on internet and sometimes these products due to their large size or the beta stage, they have potential bugs and flaws which makes the products invulnerable to these bugs if the developers are not careful to foreseen these possibilities and prepare their systems with fallback strategies. These available software would make it easier for people to code and develop systems and reduce their required development time and budget, but we should prepare for the secret key, not all of them are secure and perfect.

 

Read More...





Wordpress Blog

Continuous Delivery with Microsoft Azure, Visual Studio Team Services & GitHub

posted

Originally posted on anand's notes:
Hands-On-Lab: ...

Read More...

What is wrong with crowd source data?

posted

For past 5 years, I’ve been helping Facebook and Facebook Community to build and complete the geolocation and contact information of the locations available in our real world and made nearly¬...

Read More...

Subscribe to RSS Button for Blog

posted

One of the essential tools for the bloggers is the RSS Feed which allow the readers to get the latest blog articles without visiting their favorite blogs and website. Services like Feedly allow the...

Read More...