Posts

Showing posts with the label TECH

Featured Post

CHEMISTRY OF CHOLESTEROL AND HEART DISEASES

Image
 CHEMISTRY AND HEART CHOLESTROL- SOURCE- WAVEMAGAZINEONLINE What do we know about cholesterol or what is cholesterol? Cholesterol is a waxy, fat-like substance that are needed to make some useful hormones and is found in our blood. Cholesterol is actually needed to build certain kind of cells, but the it's presence in large quantities can have harmful effects too. It comes from two sources, first, our liver makes cholesterol that we need, the other source is, it can be obtained from food which are derived from other animals. Now, there are two types of cholesterol- 1. LDL Cholesterol- LDL stands for "low-density lipoprotein". This type of parcel protein transports cholesterol from liver to rest of the body, high levels of LDL cholesterol leads to high chances of cardiovascular diseases. It is sometimes referred to as bad cholesterol. 2. HDL Cholesterol- "HDL" stands for "high-density lipoprotein". This type of protein transports cholesterol back to liv...

NETWORK SECURITY THREATS

Image
  A threat refers to anything that has the potential to cause serious harm to a computer system. They can put individuals, systems or business computers at risk. Therefore, vulnerabilities have to be fixed so that attackers cannot infiltrate the system and cause damage. The list given below describes some of the similar threats- 1. DENIAL OF SERVICE(DoS) Attacks(DDoS) -  DoS attackers are those attacks that prevent the legitimate            users     from accessing or using resources and information. These types of attacks can steal all the     resources of     the system and can bring it to a halt state. Types of DoS attacks are- Denial of Access to Information:  Corrupting, encrypting or changing the status of information so that the information is not accessible to it's rightful user or owner. Denial of Access to Application: Forced shutting of an application as soon as the user opens ...

SECURE ONLINE TEACHING FOR STUDENTS

Image
STUDENTS are considered as the backbone of a country. Therefore, it is important to protect the students so that the backbone of our country do not breaks. Students also needs to take cautious steps to be protected online SECURITY FOR STUDENTS There are many ways through which students can protect themselves, some of them are discussed below- PHISHING MAILS- There are many cases in which the cyber crimes occurs because of fraud mails and messages. Students should not tackle with them on their own but take the consent from their parents and adults. SOFTWARES- Students should only use educational apps that are authentic and provide real time protection, they should take the consent from their parents for any non-educational app. STRANGERS- Never give out your personal information, like address, account and its password, phone number, bank details to any stranger, as it can lead to cyber crimes and threats. SET YOUR BROWSER TO ASK BEFORE REDIRECT ALWAYS. ALWAYS LOOK FOR HTTPS SITES to mai...

SECURE ONLINE TEACHING FOR TEACHERS

Image
KNOWLEDGE AND EDUCATION are the basis for all things that can be accomplished in our life. Teachers provide the power of knowledge thereby giving them possibility for better future. One of the most important part of teacher is their dedication. Therefore, it is compulsory to protect teachers in online classes by appropriate measures. SECURITY FOR TEACHERS During this unusual time teachers have to completely change their way of teaching. From the blackboard in classroom to digital whiteboard in digital screens. Apart from various changing measures in online classes teachers also need to ensure for their securities. The following points can help-\ CONNECTED ACCOUNTS- The teachers should ensure that the members in the meeting should be connected with their respective accounts to ensure that no anonymous member can enter. WAITING ROOM- If the 'waiting room' feature is availaible, it should be turned on, as it helps to select who can join the session. HOST CONTROL- Unless necessary,...

SECURITY IN ONLINE CLASSES

Image
Technology has helped a lot in ensuring that our learning process and education do not come to a standstill. Our Schools our scrambling to provide online classes to students, which is managed through self-learning, asking students to participate in online resources provided by the school using their own servers as well as using the internet. SECURITY DURING ONLINE CLASSES No doubt, online learning has filled a lot of gaps and ensured us a continouos flow of information but it has also increased various cases of cyber threats. Therefore, we need to combat the cyber threats and unsure cyber security to enjoy our learning. There are many different ways through which one can ensure security SECURITY CONCERNS- DATA BREACHES - Data breach is a significant risk whether intentional or not. Even a well educated person could accidentally compromise sensitive information by clicking on a malicious link on their smartphone. It is therefore, advisable to follow some basic and important steps, i.e.,...

ARE XIAOMI PHONES REALLY SAFE?

Image
We all must have some questions in our mind that, are xiaomi phones good, are they really safe or do do they have any harm?? All these questions will be answered in this blog, give it a read!!! In today's world, gadgets have become an indispensable part of our life. No one can live without taking a look on his whatsapp chat or surfing facebook. we do it on either our personal computers, tablets, laptops or on phones. Also large number of brands are available manufacturing and selling these commodities(Apple, Samsung, One Plus) One major brand is- XIAOMI. It manufacture goods ranging from mobiles to laptops and from smartwatches to electric  scooters. The brand has a major stake in the smartphone industry. SOME IMPORTANT POINTS YOU SHOULD SEE- The Indian Government has banned the usage of Xiaomi and Mi phones among the soldiers and their families. The brand is unpopular in USA and Europe because of it's fraud vulnerability. Acc. to FORBES: China spies on its users through their ...