HTTP vs HTTPS

INTERNET PROTOCOLS: Internet is tangible network of computers sharing/ exchanging information with the help of protocols. Internet protocols are the standards, designed to specify how computers interact and exchange messages over internet. Protocols usually specifies: –The format of the messages. –How to handle errors. HTTP: HTTP stands for Hypertext Transfer Protocol. HTTP provides a set…

How Blogging Puts You at Risk and How to Safeguard Your Privacy

  How Does Blogging Risk Your Privacy and Safety? While everyone who shops online or uses social media takes on some risk, blogging opens you up to some specific dangers that you should be aware of. As a blogger, you’re risking: Your Blog Itself You might think that your blog is an unlikely target, but…

Cryptography

Is the practice and study of techniques for secure communication in the presence of third parties called adversaries. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. The History of Modern Encryption: Encryption Algorithm Performance: Many encryption algorithms exist, and they are all suited…

Malware

Que es? Es un tipo de software que tiene como objetivo infiltrarse o dañar una computadora o sistema de información sin el consentimiento de su propietario. El término malware es muy utilizado por profesionales de la informática para referirse a una variedad de software hostil, intrusivo o molesto. El malware suele ser representado con símbolos de peligro…

Tecnology

Computer network A computer network or data network is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet. Network computer…

Computer Security

SECURITY Computer security, also known as cybersecurity or IT security, is the protection of computer systems from the theft or damage to the hardware, software or the information on them, as well as from disruption or misdirection of the services they provide. When talking about security we are refering to system reliability. WHAT NEEDS TO BE PROTECTED? HADWARE: failures.   SOFTWARE: virus, trojans…   DATA: main element to protect. Important…

Tekken

Tekken es una saga de videojuegos de lucha desarrollado y publicado por Namco, una empresa japonesa desarrolladora y distribuidora de software en el campo de los videojuegos.   Historia del juego  Heihachi Mishima, el poderoso y despiadado dueño de la multi-nacional Mishima Zaibatsu, ha anunciado el primer torneo del Puño de Hierro, una lucha contra la competencia…