Skip to content

Ravi Bandakkanavar

As a technology enthusiast, I have embarked on a perpetual journey of discovery, unearthing the latest trends, innovations, and breakthroughs that shape our modern world. Through my blog Krazytech, I aim to share my deep understanding and insights with a growing audience, weaving a tapestry of knowledge that empowers and inspires. As a founder, I tirelessly research and curate content that informs, educates, and sparks meaningful conversations. My mission is to create a space where technology enthusiasts can thrive, where ideas flourish, and where innovation takes center stage. Together, we embark on a collective journey, exploring the possibilities and potential of our digital age.

Honeypot in cyber security

Honeypot

A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.

working method of polymer memory

Polymer memory – a new way of using plastic as a secondary storage

A new memory technology promises to store more data at less cost than the expensive to build silicon chips used by popular consumer gadgets including digital cameras, cell phones and portable music players. The magical ingredient is not smaller transistors or an exotic material cooked up by the semiconductor industry. It is a plastic.

Security Requirements in Wireless Sensor Networks

Security requirements in Wireless Sensor Networks

The confidentiality objective is required in sensors environment to protect information traveling between the sensor nodes of the network or between the sensors and the base station from disclosure, since an adversary having the appropriate equipment may eavesdrop on the communication.