CYBER CRIME
The use of computers does the crime and the networks are known as cyber-crimes. With the rapid development in technology cyber-crimes also increasing fast. There are many factors that become…
To provide Scientific and religious concepts,
The use of computers does the crime and the networks are known as cyber-crimes. With the rapid development in technology cyber-crimes also increasing fast. There are many factors that become…
Dualism is basically a mind-body game. There are two concepts for dualism. One is the popular dualism which is based on materialistic things or the brain; the other is a…
The Advance President Threat (APT) is basically a type of cyber-attack with multiple goals of gaining access to secret information or a system, in order to modify data and maintain…
What is Database? The database is considered a tool that organized the data in order to serve multiple applications. The database does this through the centralization process. It centralized the…
what is BI (Business Intelligence)? Business Intelligence is basically a set of multiple methodologies, technologies, techniques, and tools. It is basically a file processing system of an enterprise, there are…
Honeypot is basically a system, a system with its own directories files. This system is used to catch hackers and multiple cyber-attacks. Some people consider the honey pot a tool…
There are basically three methods for prevention, usually, the filtration process of packets of any network helps a lot in preventing spoofing. The three methods are: What is IFM in…
The word spoof means “to hack” or “to deceive”. Spoofing is a technology that hides communication from an unknown source, the communication process in it starts with a trusted and…
What is Islam? A religion starts in the 7th century; the preacher of Islam at that time was Prophet Muhammad (PBUH). He started his preaching’s from Mecca, according to him…