Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Technology Blogs  >  lakkireddymadhu – Mad's World technology Blog  > 

Remote Access Trojan (RAT)
2020-12-21 10:44
What is RAT (Remote Access Trojan)?  A Remote Access Trojan (RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unaut… Read More
2020-12-02 07:42
Google has decided to extend Chrome support for Windows 7 for another six months beyond its original plan in order to give customers more time if their Windows 10 migration plans were delaye… Read More
The End Of Life (EOL) For Windows 7
2019-03-23 17:22
A new reminder for those who are still holding on to the Windows 7 operating system, you have 9 months left until Microsoft ends support for its 9-year-old operating system, i.e. on January… Read More
2019-01-10 18:17
APIPA stands for Automatic Private Internet Protocol Addressing. APIPA is in every version of Windows since NT and all versions of Mac OS X. APIPA is a DHCP mechanism that provides DHCP cli… Read More
10 Cybersecurity Myths
2018-12-21 01:34
A new infographic by Varonis, titled “10 Cyber Security Myths Putting Your Business at Risk” identifies what is the myth and what is the reality. If you are like most small busi… Read More
Filter Bubble
2018-12-18 17:46
A filter bubble is an intellectual isolation that can occur when websites make use of algorithms to selectively assume the information a user would want to see, and then give information to… Read More
2018-12-15 17:37
The HTTP-over-QUIC experimental protocol will be renamed to HTTP/3 and is expected to become the third official version of the HTTP protocol, officials at the Internet Engineering Task Force… Read More
2018-11-29 17:30
Computer Security Day is an annual event and is celebrated on the 30th November each year. It is designed to raise awareness and to promote best practices in Information Security. The main o… Read More
International Day For Tolerance
2018-11-15 09:17
Dear Lord, Help us to remember that you created people to be equal. Help us to remember that you love people regardless of their skin colour, their character or their culture. Hel… Read More
World Kindness Day
2018-11-11 04:30
World Kindness Day is an international observance on 13 November. It was introduced in 1998 by the World Kindness Movement, a coalition of nations’ kindness&nb&hell…Read More
2018-11-08 12:05
HTTP/2 (originally named HTTP/2.0) is a major revision of the HTTP network protocol used by the World Wide Web. It was derived from the earlier experimental SPD… Read More
2018-11-05 16:42
Both HTTP and HTTPS are protocols being used for transmitting and receiving information across the Internet. HTTP is the acronym for Hypertext Transfer Protocol. HTTP has… Read More
2018-10-20 13:48
Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name “The Onion Router”. Tor… Read More
The Top 10 Features Of Windows Server 2016
2018-10-10 14:02
Windows Server 2016 as compared to the previous version focuses more on cloud and virtualization. The top 10 features of 2016 version are as follows: 1. Windows Nano Server Nano Server is a… Read More
What Is The Latest Version Of Wi-Fi?
2018-10-08 03:02
What is the latest version of Wi-Fi? It is — Wi-Fi is 802.11ax. The Wi-Fi Alliance—the group that manages the implementation of Wi-Fi—has announced that the next version o… Read More
DNS Terminology
2018-08-29 09:01
In this post, I am going to give few basic DNS components before going to discuss the DNS functionality in depth in technical terms. Who invented the DNS? Paul V. Mockapetris (born 1948… Read More
What Is DNS And How It Works
2018-08-25 18:09
DNS stands for Domain Name System, is the backbone that runs the Internet. It is a database that works like a phone book for the internet, converts a domain name, such as “www.example… Read More
Digital Minimalism
2018-08-21 14:53
Minimalism is big these days. In particular, there’s a version of Minimalism called Digital Minimalism that’s quickly rising to prominence as our lives become incr… Read More
Cloud Computing
2018-07-24 11:25
Until the late 19th century, people produced their own power. They connected their horse, windmill or water wheel to run their own machines. However, in the late 19th century, power plants w… Read More
Incognito Mode
2017-07-05 20:57
What is incognito mode? Incognito mode — also known as private mode — is a browser mode that gives a user a measure of privacy among other users of the same device or account. In… Read More
Petya  Ransomware
2017-06-28 04:10
The WannaCry ransomware is not dead yet and another large-scale ransomware attack is making chaos worldwide, shutting down computers at corporates, power supplies, and banks across Russia, U… Read More
2017-06-15 01:55
Traditionally, InfoSec Teams had a difficult, but straightforward, job: they need to understand their assets, know what they were connecting to, and separate them from the outside world. Tha… Read More
Free Network Diagram Tools
2017-05-24 02:39
At some point, every administrator will need to diagram a network. For some, it’s their primary duty — and they tend to rely on powerful, expensive tools like Microsoft Visio. Bu… Read More
WannaCry Ransomware
2017-05-17 19:27
A massive ransomware campaign hit computer systems of hundreds of private companies and public organizations across the globe – which is believed to be the most massive ransomware deli… Read More
2017-04-24 19:41
Ransomware is a sophisticated piece of malware that blocks the victim’s access to his/her files. There are two types of ransomware in circulation: Encrypting ransomware, which incorpor… Read More
Nobel Prize Of Computing
2017-04-20 00:01
The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to “an individual selected for contributions of a technical natu… Read More
Robert Taylor: Computer & Internet Pioneer
2017-04-18 01:42
Robert William Taylor, known as Bob Taylor a computer scientist who was instrumental in the creation of the internet and modern computer, has died on Thursday, April 13, 2017, He was 85… Read More
2017-03-07 20:18
This life has no existence without a strong ally in the woman in every stage of life starting from motherhood to wife, sister and finally a daughter. Happy Women’s Day!     … Read More
Authenticating SSL VPN Users Using LDAP
2016-09-19 16:58
This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user and authentication data ca… Read More
2016-08-26 06:09
HOW DO YOU remotely hack a computer that is not connected to the internet? Most of the time you can’t, which is why so-called air-gapped computers are considered more secure than… Read More
AIR-GAPPED Computers
2016-08-26 06:09
AIR-GAPPED Computers HOW DO YOU remotely hack a computer that is not connected to the internet? Most of the time you can’t, which is why so-called air-gapped computers are conside… Read More
SysAdmin Day – July 29, 2016
2016-07-23 18:27
System Administrator Appreciation Day Your network is secure, your computer is up and running, and your printer is jam-free. Why? Because you’ve got an awesome sysadmin (or maybe… Read More
File System Check Error In FortiGate
2016-07-17 06:56
File System Check Error in FortiGate 5.2.3 and above In FortiOS 5.2 patch3, the file system check dialogue was introduced in the GUI and it offers the options to restart the unit and perform… Read More
2016-07-02 16:46
We receive password protected bank statements, credit card statements, mobile bills and salary slips every month. It’s quite OK to have passwords for PDF files that we rarely use but t… Read More
2015-12-02 12:39
Li-Fi stands for Light Fidelity. Li-Fi is a new wireless technology that transmits high-speed data using light (i.e. Visible Light Communication or VLC) rather than radio bands. Li… Read More
2015-11-03 08:49
Finding useful information on the ­World Wide Web is something many of us do. We can find information about anything by searching online. Google is the most popular search engine availab… Read More
2014-08-05 15:57
Resetting a lost admin password: Periodically a situation arises where the FortiGate needs to be accessed or the Admin account’s password needs to be changed, but no one with the exist… Read More
2006-06-07 11:16
WHAT WOULD YOU DO IF YOU LOST EVERYTHING?   Things to backup There are many things that hold our data. Computer Laptop Smartphone IPod Tablet Other electronic devices Photos and videos… Read More

Share the post

lakkireddymadhu – Mad's World


Subscribe to Lakkireddymadhu – Mad's World

Get updates delivered right to your inbox!

Thank you for your subscription