How to create Skype ID

 

Hey! Now a days in this covid Pandemic situation everyone is working from remote location or works from Home. Hence the Importance of Video Conferencing Solution increased day by day. There are so many Platform which provide the solution like Skype, Zoom and many more.


So, I am going to tell you How we can create the SKYPE ID and how to use it.


1. Open your Browser and Go to www.skype.com and select Sign In in the upper-right corner.



2. Select new to skype , Sign up and the sign up form will appear.Here you have to provide your E-mail Id or the Mobile No. . Choice is yours Follow the directions and enter the required information.

3. Review the terms of service and the Skye Privacy Statement, then click Continue.

4. Your account has been created. Select Download Skype.

5. Locate and select the installation file on your computer, then follow the instructions to install Skype.

6. Enter your user name and password, then click Sign in.

In case of you have any Technical Query, Please feel free to contact me.

Are you bother about slow Network Issue? Please read this

Hello Friends,

Today I am again with you with the query of most of my friends Regarding the Network Latency. Most of the Organization in the industry are facing the slow internet Speed Issue, when they inquire from the ISP he said the Speed is fine there is some local issue at your end. 

So How we come to know where is the gap and why we are getting slow Internet speed in the Sharing Enviornment. So let us start with the steps how we can diagnose and fix the Problem.

First Thing First

Before blaming the ISP we should confirm that our internal Network is working fine with the help of the following steps

1. You need to check the latency  between the firewall/router through which your internet is distributed  and the working PC. You may check it with the PING command. In local LAN it always should be less then 0(depends on the location of the firewall). If it is not then there is something wrong in your network.

2. Monitoring firewall- This is a very impotent to understand the firewall.Firewall is the entry and exit point of the network.Hence one can read the Logs of the firewall and can Analyze the same where the Internet Bandwidh got consumed.

3. Schedule the Time for Antivirus/Software Patch Update-In many cases it has been found that due to the Antivirus defination Updates and Application Patches update in working time which is running in the background and not known to the user, the Internet speed goes down hence it is advisable to Schedule the update of  the same in non-productive time. 

4. Monitoring Antivirus Log- In most of the cases it has been found that due to the virus in the network , the network got chocked hence it is necessary to scan your System in the network on daily basis and Monitor the Antivirus Logs to maintain the speed and reliability of the network.

5. Control the Usage of Internet- one can control the Usage of Internet by defining the Policy in the Firewall depending on the Management Decision.

6. Now even after you are not getting the Speed upto your satisfaction then terminate the ISP provided Internet Connection to the Local PC and Verify the same.

7. Last but not Least , The communication Channel like Switch, Wire, Connector etc. play a vital roal in the network hence you should make it sure that these comunication channel should be dust free and you may also consider to replace the switches from mbps to gbps speed.

You are free to send your opinion and advice regarding this blog.

You are always welcome to ask any technical query .

 -Thanks

Backup and DRS(Disaster Recovery site)

There is no need to tell any body about the importance of the Backup and it becomes very important in such envoronment where we can not rely on security which we have applied to our systems.

There are so many Physical Media, Softwares and other utilities are there for the backup. A good IT Professional can also design and develop  his own peogram for the backup using .bat file/ VB Script etc.

If you are using Oracle  or MS-Sql or any other database to store your data , then you can schedule the backup and restoration process.

The thaught about taking  backup is as old as data itself. The technology associated with it has traveled a long distance coming from floppy disks, backup CDs and DVDs, then USBs and now to dedicated backup appliances and offsite or remote backup repositories.

Unlike the past, backup technology is now on a completely different scale. The backup market has seen explosive growth over the last few years and a number of reports suggest a stable continuation of the rise in the market growth rate.

Data redundancy and Data backups

Before indulging into the types of backup technologies, a concept deserves an honorable mention: data redundancy. Data redundancy is often confused with backup services, so it’s important to draw a line between it and data backups.

Data redundancy is simply the creation of replicas of data. In other words, you’re creating the same file in multiple locations. An example of this would be creating a file on your local system and then copying it on a USB flash drive; each time you update it. This is not the same as backup.

Backups are compressed version of the original data that you create. Usually, third party software creates these backups for you and the same software can use those files to restore them.

To clarify this, let’s say I gave you two files: one is the exact copy of your original file and the other is a backup file of that original data. You can use the copy as soon as it’s on your local system. For the backup file, you’ll need the software that created it and then you’ll have to restore from the backup file to access the original data within it.   

Now that we’ve established the difference between redundancy and backups, let’s discuss some types of backup technologies

Different type of backup technologies

Backup technologies can be divided into three main types:

  • On-premises backup appliances
  • Cloud backups
  • Hybrid backup solutions

I did not include tape storage solutions like USBs/flash drives, external hard drives, etc. in backup technologies because mostly they keep copies of the original data. And we have established before, that’s not backup; that’s data redundancy.

On-premises backup appliances — These are purpose built appliances that backup the data of specific departments or the entire business using a configured network and the right credentials. Mostly, these appliances sit idle and are used for the purpose of creating backups. They perform diligently when accessed to restore data.

However, how often do you lose data? Not so often right? That’s exactly the frequency of utilization for these appliances. That’s also the drawback; while they’re purpose is very important for businesses, especially for businesses with mission critical data, these appliances sit idle and are used infrequently. However, they do continue to consume resources like maintenance, power costs, cooling costs, etc.

The one big benefit of these appliances is that they’re faster than any other backup technology. If your IT infrastructure cannot tolerate delay when restoring data, then these appliances are the best option for you. They can facilitate heavy Input / Output (IOP) requirements while keeping the latency in check.

Cloud backups — With the accelerating cloud adoption, backups in the cloud are not a new concept. It’s the same as backing up in a backup appliance, the difference is you’re doing it over the internet and you’re backing up into someone else’s datacenter. The biggest advantage of cloud backups is the cost efficiency and the scalability of it.

There are a number of complications involved with scaling up a physical backup appliance. Cloud technology removes all those complications and makes the whole process simple. In terms of cost, you don’t have to invest as much as you would have to for the appliance.

Cloud based services also facilitate pay-as-you-go payment models. You don’t have to initially acquire storage resources in advance, you can scale-out as you go and you can pay for them as you scale-out.

Hybrid backup solutions — These are an interesting mix of solutions that can address a diverse range of data requirements. Hybrid backup solutions combine both on-premises and cloud based backup technologies.

IT infrastructures can setup physical appliances on-premises with cloud connect services or cloud gateway appliances and extend the backups to the cloud. Using this combination, they can keep the frequently used or mission critical backup data on-premises for reduced latency while using the cloud for infrequently used data backups. This combination adds the less latent on-premises technology with the scalable and cost effectively cloud technology.

We have differentiated between redundancy and backups and we’ve briefly discussed the three types of backup technologies; but we haven’t established what exactly is the big deal about backup technology? I know, it took a while but now we’re here.

The big deal about backup technology

Data loss can incur financial consequences, disrupt business processes and the worst case scenario includes eating up the whole business. Allow me to explain that with an example.

Imagine a financial services provider that has to process transactions by the minute. Due to compliance reasons and for record maintenance, this service provider has to maintain all of this data on their servers. If this data is not backed up and a server or servers crash due to hardware failure or power loss, then all of this data can be lost. If it is lost, then the service provider is in major trouble.

They have to answer to regulatory authorities while dealing with a ton of angry customers. If there data is backed up, they can notify their customers and apologize, recover and then just continue their service provision.

This fear of losing data, having your business disrupted and adversely affected is the reason why businesses around the globe are adapting backup technology to prevent it.

Now to conclude it is not necessary to say about the importance of data backup.what do you think about it? Are backup technologies really that big of a deal? Share your thoughts by commenting below. If you like this blog what I’ve written, remember to share with like-minded professionals.

You also can contact me at singhalyogesh@gmail.com  for any technical support you require.I will try my level best to solve your technical issue.



Cyber Security

This is not new that many of us are getting cyber threats by email and by other means like visiting malicious websites, using infected pendrive or infected mobile Phone etc.

In this pandemic situation of Covid 19 we have to take care of our data along with our health.

Securing the IT infrastructure/ data is not a one time process, it is a regular process which need to be reviewed on daily basis. In today's scenario Data is very important and Hence the attackers target is not to damage the Hardware but they target the data. Hence they destroy/encrypt the data so that they can demand the money against the data and even after paying the money it is not quite sure that one can retrieve the data. Hence precaution is always better then cure.


Now, I will explain how an attacker attacks with the help of email. One day one of my friend received an email from unknown person on his official email id configured in outlook with the attachment. It seems to be a genuine email from some financial institutions.  He has been asked to open the attachment in the mail. He clicked on the attachment and after few seconds his PC got hanged he restarted his PC ANDfoynd that he is not able to open any of his file as it got infacted with the ransomeware.

 Now , It is very important to know that how we can protect the data and what are steps we should do for it

Following are some of the best practices for computer use on day to day basis: 


1. Create strong passwords for login by using a combination of letters, numbers, and special characters with minimum of 10 characters. 

2.Computers should be protected from virus/worms using an Antivirus software permitted for use by your organization. 

3.Make sure your operating system, application and software patches including anti-virus software are up to date; and auto updates are turned on in your computer. 

4. Don't leave the computer unattended with sensitive information on the screen. 

5. Always lock your computer before leaving workplace to prevent unauthorized access. A user can lock computer by pressing„ctrl +alt+del‟ and choosing „lock this computer‟ or “window button+ L”. 

6. Enable a password-protected screen saver with a timeout period of 2 minutes to ensure that computers that were left unsecured will be protected. 

7. Be careful of what you plug in to your computer. Malware can spread through infected USB drives, external hard drives, and even smart phones. 

8. Use non-administrator account privileges for login to the computer and avoid accessing with administrator privileges for day-to-day usage. 

9. Treat sensitive data very carefully and use encryption to securely encode sensitive information. 

10.Backup your important files at regular intervals to avoid unexpected loss. 

11.Remove unnecessary programs or services from computer which are not required for day to day operation. 

12. Do not give remote access, file and print sharing option to other computers. 

13. Do not use file sharing softwares as file sharing opens your computer to the risk of malicious files and attacks. 

14. Avoid entering sensitive information onto a public computer like cyber cafe, library computers etc., 

15.If you store or download  any personal information on computers in cyber cafĂ©, make sure you delete permanently all the documents after you are done with your work. You may press Shift and Delete button together to make it difficult to recover deleted files. 

16.Remove files or data you no longer need to prevent unauthorized access to such data. Merely deleting sensitive material is not sufficient, as it does not actually remove the data from your system. File shredder software should be used to delete sensitive files on computers. 


Steps for Safe Browsing 

Following are some of the best practices to keep in mind when browsing on Internet: 

1. Always be careful when clicking on links or downloading. If it‟s unexpected or suspicious for any reason, don‟t click on it. 

2. Do not download any type of files/software from any source other than those allowed by your system administrator/department. 

3. Use web browser which has been permitted by your Organization. 

4. Always use updated web browser for browsing. If you run a web browser that is out of date, it may contain security vulnerabilities and you risk having your computer compromised. Depending on the security exploit, your personal information (including emails, banking details, online transactions, photos and other sensitive information) could be stolen or destroyed. 

5. Do not store/ share any sensitive information on any device that is connected to the Internet. 

6. The "Save password" option prompted by the browser should not be selected if a window appears after entering information on the login screen, asking you to do so.Don‟t save account information, such as passwords or credit card information in web browsers, especially on those PCs which are shared with other users. 

7. Look for HTTPS sign in the browser address bar.  The “s” in “https” stands for secure, meaning that the website is employing SSL encryption. Check for an “https:” with a green padlock icon in your browser address bar to verify that a site is secure. 

8. Make a habit of clearing history from the browser after each logout session. Following are the settings in various browsers to automatically clear the history on each browser session ends: Chrome 

Click on the menu icon in the upper right corner and select Settings> Show advanced settings... 

>Privacy and then tap the Content settings button. 

In the next window that opens, under Cookies, enable the option that says "Keep local data only until you quit your browser." 

Press Done at the bottom of the window. Firefox 

Click on the menu icon in the upper right corner and select Options. Then in the window that opens, click on the Privacy tab.  

Under History, click the drop down menu next to "Firefox will:" and select Use custom settings for history. 

Check the option Clear History when Firefox closes. 

Once you're done click OK.  Internet Explorer 

Click settings icon in the upper-right corner of the browser and select Internet Options.  

Open the General Tab in the window that appears.  

Under the Browsing History section, check the box next to "Delete browser history on exit." Once you're done click OK.  

9. No classified information of government can be stored on private cloud services (Google drive, Dropbox, iCloud etc.,) and doing so may make you liable for penal action, in case of data leakage. 

10. When on tour, avoid using services that require location information, unless it is necessary for discharge of office duties. 

11. While browsing, some pop-ups may appear with option of close button.These may be fake and may actually try to install spyware when you click on it. Beware of such pop-ups and avoid clicking on it. 

12. Popup blocker option should be kept turned ON in the browser and may be selectively allowed for trusted sites, if required. Doing so will help prevents any nuisance web ads or malware embedded in ads from appearing on screen. Following are the setting to turn on popup blocker configure in various browsers: Firefox 

Select Tools from the Mozilla Firefox taskbar 

Select Options from the drop-down menu 

Select Content from the Options dialog box 

To enable all pop-ups, check the Block pop-up windows radio button 

Click Close Chrome 

Click on the Menu  

Click on Settings 

Scroll to Privacy, Click on Content Settings 

Scroll to Pop-Ups 

Uncheck Allow All Sites to show Pop-Ups 

Click OK 

Internet Explorer 

Click Tools menu 

Click Internet Options 

Click Privacy tab 

Under Pop-up Blocker, Check Turn on Pop-up Blocker  Click OK 

13. Remember that things on the internet are rarely free. “Free” Screensavers etc., often contain malware.So be aware of such online free offers.  

14. Avoid using public computers and public Wi-Fi connections to access and carryout any financial or sensitive transactions. Accessing government email on such computers has a risk of causing information breach. 

15. If your job requires you to access certain information systems in a secure way, it is advisable to use security controls such as MPLS link, VPN over internet etc., for such access. 

Password Management 

Unauthorized access is a major problem for anyone who uses a computer or devices such as smartphones or tablets. The consequences for victims of these break-ins can include the loss of valuable data such as classified information, personal data etc. One of the most common ways that hackers break into computers is by guessing passwords. Simple and 

 

commonly used passwords enable intruders to easily gain access and control a computing device. 

Following are some of the best practices to consider while setting up and managing a password, 

1. Create strong password with a minimum length of ideally 10 characters and comprising of mix of alphabets, numbers and characters. 

2. All passwords (e.g., email, computer, etc.) should be changed periodically at least once every three months.  

3. Don‟t reuse old passwords. 

4. Passwords should not be stored in readable form in computers, notebook, notice board or in any other location where unauthorized persons might discover or use them. 

5. Treat passwords as sensitive information and do not share it with anyone. 

6. Always use different passwords for every log-in accounts you have. Using the same password for more than one account risks multiple exposures if one site you use is hacked. 

7. If your work requires you to communicate passwords, such as while sending password for an encrypted file sent as an attachment through email it must be communicated through a different channel such as over a phone call or SMS. 

8. Always decline the use of the "Remember Password" feature wherever it is prompted by the applications. 

9. Remember weak passwords have the following 

characteristics: 

The password contains less than 10 characters 

The password is a word found in a dictionary (English or foreign) 

The password is a common usage word such as: Names of family, pets, friends, colleagues, Movie / Novel / Comics characters, etc. Computer terms and names, commands, sites, companies, hardware, software. 

Birthdays and other personal information such as addresses and phone numbers. 

Word or number patterns like 123456, aaaaa, qwerty, asdfg, zxcvb, etc. 

10. Some suggested way to construct a strong password are 

as follows, 

A secure password not only consist of letters, must also use numbers, special characters and caps. One suggested way to replace letters with numbers and special characters, so an “i” will become “!”, an “o” turns into a “0” and “s” is written as “$”. This way, the simple term “Microsoft” changes to the substantially harder word “M!cr0$0ft”. 

Password length matters, the longer the password, the harder it is to crack. 

Think of a sentence and select the first letters of each word in a row will get a complex password and easy to remember as well.  


Removable Information Storage Media 

One of today‟s biggest security concern is the use of removable storage devices (USB devices such as pen drives, CD-RW, DVD-RW, Blu-ray discs, Media cards etc.,) in their networks. The amount of data that can be quickly copied to removable storage devices is increasing every day. While these devices can significantly boost productivity, they can also cause dangerously high risks in data security and control policies.  

External removable portable storage devices allow users to bypass perimeter defenses, including firewalls and email server anti-malware, and potentially introduce malware into the office network. Since the malware enters the network from an internal device, it may go undetected until significant damage is caused to the network. Removable storage devices also facilitate easy pilferage of sensitive information from an organization's premises. This information might include classified information. 

Following are some of the best practices to be considered while dealing with Removable storage media: 

1. Auto run/ Auto play feature must be disabled for all removable media. 

2. The classified data should be encrypted before copying into the removable storage media designated to store classified information. 

3. Classified information should be stored only on organization allocated removable storage media for work purpose. 

4. The computers should be enabled with “Show hidden file and folders” option to view hidden malicious files in USB storage devices. 

Steps to enable hidden file & system file view to find any unusual or hidden files in computer are as follows: Windows 10  

In the search box on the taskbar, type folder, and then select Show hidden files and folders from the search results. 

Under Advanced settings, select Show hidden files, folders, and drives, and then select OK. 

Windows 8.1  

Go to Search. 

Then type folder in the search box, then select Folder Options from the search results. 

Select the View tab. 

Under Advanced settings, select Show hidden files, folders, and drives, and then select OK. Windows 7  

Select the Start button, then select Control Panel -> Appearance and Personalization. 

Select Folder Options, then select the View tab. 

5. It is advisable to scan all removable media with anti-virus software before use. 

6. Removable media like USB‟s, CDs etc., must not be left unattended. 

7. Technical controls may be implemented to restrict use of portable storage media drives outside of the Government network. 

8.Removable media should not be taken out of office unless permitted by the competent authority in your office.  

9. In order to minimize physical risk, loss, theft or electrical corruption, all storage media must be stored in an appropriately secure and safe environment. 

10. In case of damage or malfunction of device, the same should be returned to the designated authority in your office for repair/replacement.  Never ever handover such devices to outsiders or other vendors for repair as it might have classified information. 

11. If the USB device is no longer a functional requirement after issuance, then the same should be returned to the issuing authority. 

12. The contents of removable media must be removed/erased after the official purpose has been served. 

Email Communication 

Following are some of the best practices in regards to email communication: 

1. Use only ORGANIZATION provided email address for official communications .

2. System administrator may deploy appropriate controls to restrict use of personal email address for any official communications. 

3. Avoid downloading email attachments or clicking on suspicious links received in emails from unknown or untrusted sources.  

4. Classified information be not communicated via emails.  In case of emergent requirements to do so, the approval of competent authority should be obtained.   

5. Avoid accessing official email accounts from public Wi-Fi connections. 

6. Auto save of password for email accounts should not be enabled. 

7. Logout from mail accounts after your work is done. 

8. User should type the complete URL in the browser instead of clicking links received in an email. 

9. Do not open / forward / reply to any suspicious e-mails. 

10. Be cautious on tiny or shortened URL‟s (appears like http://tiny.cc/ba1j5y) and don‟t click on it as it may take you to a malware infected website. 

11. Do not open attachment having extension such as EXE, DLL, VBS, SHS, PIF, SCR. Typical example., . txt.exe, .doc.exe 

Office Wi-Fi Network 

With the mass explosion of Laptops, Smart Phones and Tablets, pervasive wireless connectivity is widely used an option for connecting to the Internet. Insecure wireless configuration can provide an easy open door for malicious threat actors. Officials may use their home Wi-Fi network to do office work and in order to secure their home WiFi network, following are some of the best practices: 

1. Turn on WPA2 or higher encryption feature in wireless routers.  

2. Change the default network device name, also known as its service set identifier or "SSID."  When a computer with a wireless connection searches for and displays the wireless networks nearby, it lists each network that publicly broadcasts its SSID. It is advisable to have SSID name which does not disclose your identity in any manner. 

3. Change the network device default password. Unauthorized users may be familiar with the default passwords, so it is important to change the router device's password. 

4. Consider using the Media Access Control, or " MAC," address filter in your wireless router.  Every device that can connect to a Wi-Fi network has a unique ID called the "physical address" or "MAC" address. Wireless routers can screen the MAC addresses of all devices that connect to them, and users can set their wireless network to accept connections only from devices with MAC addresses that the router will recognize. To create another obstacle to unauthorized access, consider activating your wireless router's MAC address filter to include your devices only. 

5. Turn off your wireless router when not needed for any extended period of time. 

6. Update the firmware of wireless devices regularly as it will reduce the number of security loop holes in the device. 

7. Disable remote management feature in routers to protect against unauthorized access. 

8. Use of Social Media

All personnel including employees, contractual staff, consultants, partners, third party staff etc., who manage, operate or support information systems, facilities, communication networks; and information created, accessed, stored and processed by or on behalf of your organization , unless authorized to do so, shall not: 

a. Access social media on any official device (computer, mobile etc.).  

b. Disclose official information on social media or social networking portals or applications. 

9. Avoiding Social Engineering Attacks 

Social Engineering is an approach to gain access to information through misrepresentation. It is the conscious manipulation of people to obtain information without realizing that a security breach is occurring. It may take the form of impersonation via telephone or in person and through email. Following are some of the best practices should follow to avoid social engineering attacks: 

9.1. Be careful to unsolicited phone calls, visits, or email messages from individuals asking about personal or other Government information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company. 

9.2. Phishing is one of common type of social engineering scam. The hacker typically sends an email or text to the target, seeking information that might help with a more significant crime. So do not reveal personal, sensitive or financial information in email or messages, and do not respond to such emails. 

For example, a hacker might send emails that appear to come from a source trusted by the victim. That source might be a bank for instance, asking email recipients to click on a link to log in to their accounts. Those who click on the link, though, are taken to a fake website that, like the email, appears to be legitimate. If they log in at that fake site, they‟re essentially handing over their login credentials and giving the crook access to their bank accounts. 

9.3. Vishing is the voice version of phishing. “ V” stands for voice, but otherwise, the scam attempt is the same. The hacker uses the phone to trick a victim into handing over valuable information. So don‟t reveal any sensitive information over phone calls. 

For example, a hacker might call an officer, posing as a Government officer. The hacker might prevail upon the victim to provide login credentials or other information that could be used to target the Organization. 

9.4. Quid pro quo scam is another type of social engineering attack that involves an exchange like I give you this, and you give me that. Hackers make the victim believe as a fair exchange, but that‟s far from the case, as the cheat always comes out on top. 

For example, a hacker may call a target, pretending to be an IT support technician. The victim might hand over the login credentials to their computer, thinking they‟re receiving technical support in return. Instead, the hacker can now take control of the victim‟s computer, loading it with malware or, perhaps, stealing personal information from the computer to commit identity theft. 

9.5. Be cautious of the URL of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net). In general, all government websites have gov.in or nic.in at the end of their names.  For example, a malicious website may have name as www.npagov.in  or www.npagov.in against the actual name www.npa.gov.in  

9.6. It‟s safer to type a URL into your browser instead of clicking on a link. Hovering over links in email will show the actual URL at the bottom, but a good fake can still steer you wrong. 

9.7. Hacker wants you to act first and think later. If the message conveys a sense of urgency or uses high-pressure sales tactics be skeptical; never let the urgency influence your careful review. 

9.8. If you receive an email from a foreign lottery or sweepstakes, money from an unknown relative, or requests to transfer funds from a foreign country for a share of the money it is guaranteed to be a scam and do not respond and delete such emails. 

9.9. Immediately change any passwords you might have revealed to anyone. If you used the same password for multiple resources, make sure to change it for each account, and do not use that password in the future. 

10. Glossary 

Term Definition 

DDoS A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. 

DHCP The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on UDP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks. 

Digital 

Signature A digital signature is a way to ensure that an electronic document (e-mail, 


spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you know that it has not been altered in any way since that person created it. 

DNS The domain name system (DNS) is the way internet domain names are located and translated into internet protocol addresses. 

Encryption Encryption is the process of encoding a message or information in such a way that only authorized parties can access it. 

GPS The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information. 

HTTPS Hypertext Transfer Protocol over Secure Socket Layer is a URL scheme used to indicate a secure HTTP connection. 

IM Instant Messaging a type of communications service that enables you to create a kind of private chat room with another individual in order to communicate in real time over the Internet. 



IoT Internet of Things (IoT) is an ecosystem of connected objects that are accessible through the internet. 

Malware Malware is short for malicious software and used as a single term to refer to virus, spy ware, worm etc. 

SMS SMS is a text messaging service component of most telephone, internet, and mobile-device systems. 

SNMP Simple Network Management Protocol is used in network management systems to monitor network attached devices for conditions that warrant administrative attention. 

SSH Secure Shell is a network protocol that allows data to be exchanged using a secure channel between two computers. 

SSID Service Set Identifier is a name used to identify the particular 802.11 wireless LAN to which a client wants to attach. 

Trojan A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike 


viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft. 

URL A Uniform Resource Locator (URL), colloquially termed a web address is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. 


USB A Universal Serial Bus (USB) is a common interface that enables communication between devices and a host controller such as a personal computer. 

Virus Virus is a program written to enter to your computer and damage/alter your files/data and replicate themselves. 

VPN A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. 

Wi-Fi Wi-Fi certified is a program for testing 

Certified  products to the 802.11 industry standards for interoperability, security, easy installation, and reliability. 

Worms Worms are malicious programs that make copies of themselves again and again on the local storege device

 

 

 

 

 

 

 

(version 1.0) 








.



Recover Deleted History on Google Chrome

Recover Deleted History on Google Chrome It might happen some time that you loose your Chrome History by any reason.But after that you need ...