A virtual private network (VPN) is a technology to connect computer systems with remote computer networks by using the Internet or another intermediate network. In other words, A VPN is a private network that uses a public network to connect remote sites or users together. The VPN uses "virtual" connections routed through the Internet from the business's private network to the remote site or employee.
VPNs can connect individual users to a remote network or connect multiple networks together.
For example, users may use a VPN to access their office system from home.
Artificial intelligence (AI) is "the study and design of intelligent agents" where an intelligent agent is a system that perceives its environment and takes actions which maximizes its chances of success.
In other words, AI is defined as "the science and engineering of making intelligent machines."
The term artificial intelligence is also used to describe an attribute of machines or programs: the intelligence that the system demonstrates.
The Internet has completely revolutionised the computer and communications world. The Internet is a world-wide broadcasting capability, a mechanism for information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic location.
Users of virgin mobile must pay attention as the data in your mobile phones is not safe anymore. Your phone number is the main key to your personal information. According to Kevin Burke, who warned Virgin Mobile USA customers about a conspicuous security hole in the phone company's account login protocol said, "If you are one of the six million Virgin subscribers, you are at the whim of anyone who doesn’t like you."
Introduction
Cloud computing means using the computing resources both hardware and software, that are delivered as a service over Internet. In other words, computer and software services necessary for computing works provided via the internet is called cloud computing.
Think before speaking - This is not something new, but however often we hear it, we forget to apply it. To think before speaking means to show consideration to the other and then we say the right thing, at the right time, in the right way.
Listen with both ears - We should be an active listener by tuning in fully and being present fully with the person and with the moment. If I am not, I listen through one ear and let it out of the other, or I only half listen, which finally creates misunderstandings.
Background
To understand the requirement of DNS server, we have to go back to initial stages of networking of the computers around late 1960’s and early 1970’s when only single computer is used in the university due to cost and other factors.
The concept of cyber crime is not totally different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the permit of the state.
Crime is a social and economic phenomenon and is as old as the human society. Crime is a legal concept and has the sanction of the law. Crime or an offence is “a legal wrong that can be followed by criminal proceedings which may result into punishment.” The hallmark of criminality is that, it is breach of the criminal law.
Prevention is always better than cure. It is always better to take certain precaution while operating the net. ANUP GIRDHAR, Editor In Chief, Cyber Times advocates that we should follow 5 main key points : Precaution, Prevention, Protection, Preservation and Perseverance for online security.
Steps to prevent cyber crime:-
1. Never disclose your personal information publicly on websites. This is as good as disclosing your identity to strangers in public place.
Debugging a shell script is very essential to check your script for any errors before moving in to production. There are different debugging tips and tricks useful for running your scripts
without any flaw.