27001 – Page 2 – POFTUT

What Is A Computer Virus?

What Is A Computer Virus?

A computer virus is a special computer program that tries to replicate itself by modifying other computer programs and try to infect as much as it can. Computer viruses are unintended programs that generally run without user acceptance by hiding themselves. Computer viruses are created by hackers or Black Hat Hackers in order to gain … Read more

What Is White Hat Hacker?

What Is White Hat Hacker?

Before starting to talk about White, Grey and Black Hat Hackers we should learn the real meaning of the Hacker . Actually hacker is not a bad person or hacking is not a malicious action. Hacking simply means working with a specific electrical or digital device, service or system in an unusual way. Hackers are … Read more

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 is a hash algorithm that is created by the National Security Agency (NSA). SHA1 hash algorithm is generally used in security and data integrity applications. SHA-1 is created in 1995 as the successor of the SHA-0. Both SHA1 and SHA-1 refer to each other. Secure Hash Algorithm 1 or SHA1 SHA1 is in a … Read more

What Is Kensington Lock For Laptop and Computer Security?

What Is Kensington Lock For Laptop and Computer Security?

Computers and Laptops physical security can be accomplished in different ways. Especially in ISO 27001 the physical security of the IT infrastructure is required. Locking the laptops and computers are one part of the physical security. We can use Kensington locks in order to lock our computers and laptops into a specific location and place. … Read more

Windows Defender (Microsoft Defender) Review and Tutorial For Windows Antivirus

Windows Defender (Microsoft Defender) Review and Tutorial For Windows Antivirus

Windows operating system is the most popular operating system in the world. It is used by 77.61% of the computers. Popular usage makes Windows operating systems a very valuable target for hackers, viruses, malware, trojans, etc. In order to protect a Windows system, an antivirus can be used. Windows Defender is a built-in antivirus provided … Read more

How To Manage, View, Delete Saved Passwords In Chrome, Firefox, Edge?

How To Manage, View, Delete Saved Passwords In Chrome, Firefox, Edge?

Today’s internet provides a lot of different web sites and web applications. In daily life, we use a lot of different web applications which is personalized for us. While using these applications we generally use some login information for authentication, privacy, and personalization. Saving Passwords To Browser While using these web applications we need to … Read more

How To Delete Google Search and Chrome Browser History?

How To Delete Google Search and Chrome Browser History?

Google and its services are at the center of our lives. Google tracks our location, behaviors, friends, calls, web activity, etc. Google Chrome is the most popular browser currently with 80% of the browser market share. Google Search History Google is actually a big data company where it stores a lot of user data. These … Read more

KillDisk – Erase and Wipe Disk Securely and Completely On Windows

KillDisk - Erase and Wipe Disk Securely and Completely On Windows

KillDisk is a software used to erase and wipe disk securely and completely on operating systems like Windows, MacOSX, Linux. KillDisk can be used from inside the operating system or by booting the KillDisk without an operating system. It is also called as Hard Drive Eraser by its developer. KillDisk Features KillDisk provides a lot … Read more

What Is Phising, Attack Types and Defences?

What Is Phising, Attack Types and Defences?

Phishing is a cybersecurity attack to convince target humans to convince to provide some valuable information about them or their assets. Phishing mainly targets human being and human-related vulnerabilities to exploit. Phishing History The first legal lawsuit was filled in 2004 about the phishing. The attacker was a Californian teenager who has created a fake … Read more