Tag Archives: Biggest Security concerns

Graphical Password Authentication

Noway days people do not go to a bank to make a transaction, do not go to an Electric board to pay bill, do not go to railway station to make a train reservation and what not. All these time consuming and non productive tasks are simplified because of Internet (Read more on How Internet works?). To carry out… Read More »

Fingerprint Identification System using Neural Networks

Biometric Identification Systems are widely used for unique identification. Especially for verification and identification. There are many types of biometric systems like fingerprint recognition, voice recognition, face recognition, palm recognition, iris recognition, etc. Among all of these, Fingerprint recognition is one of the well-known and most widely used biometric technologies. A fingerprint is the pattern of ridges and valleys on the… Read More »

Honeypot

A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.