Menu Close

Author: Spandan Chowdhury (page 1 of 1)

SSL is nothing more than “False Sense of Security” to Website Owners

While you might be overwhelmed by the fact that an E-Commerce portal is “secured by SSL”, and hence you can perform your online transactions without any worry, the truth is that SSL isn’t the end of the road.

It often misleads people into thinking that an SSL secured website means that it is completely safe in every way. But SSL only ensures the security of the information while transmission. While it secures a connection from being spied upon, …

Read the full article

Security still an important reason for people not using E-Commerce portals!

While I was handing over my credit card to the waiter in a restaurant, my mother was staring at me in shock. She asked me “what if they draw out all the money from your account?” Just then a question came to my mind; we rarely do even think twice before handing over our credit cards to a waiter or a store clerk, then why do we often feel jittery while purchasing something online, or going for online banking? What …

Read the full article

WEP as a Weak Algorithm

Read the full article

An Introduction To Hacker’s OS: Kali Linux

We have had innumerable discussions on computer security till today. This article brings to you one of the biggest and the most important tools that every penetration tester or a hacker uses.

Today we are going to introduce you to Kali Linux, a Linux Distribution, which is more of a branch of Debian, but with several specialties. If you have heard of BackTrack, then Kali should be introduced to you more as an updated version of the former. “From the …

Read the full article

Top 5 Biggest Online Security Breach in the History of Computers

Security BreachTechnology and science is making progress, and so is the other side of this double edged sword. Looking at the flip side of the coin once in a while would definitely tell us that we are developing, but facilitating the growth of the darker side of the new world too.

Security breach is one of the biggest examples of the negative effects of the progress in technology. And that is what I am going to talk about today. No security …

Read the full article

Difference between Hackers and Crackers

hackerVS cracker_Czar

Yet again, the same topic comes up. Who is a hacker? Who is a cracker? Are they the same people with two name tags, or are they really different people? If they are different, then how? Well this has been an age old topic of discussion, and has been a part of various controversies. But still, here I am, trying to give you a little insight into this matter, and trying to clear a few of your doubts.

Google still …

Read the full article

© 2024 Czar Securities. All rights reserved.

Theme by Anders Norén.