Tag Archives: Threats to the Internet
Honeypot
A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.
Computer Forensics
Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis. Computer forensics is simply the application of disciplined investigative techniques in the automated environment and the search, discovery, and analysis of potential evidence.
Anatomy and Working of Search Engines
Security requirements in Wireless Sensor Networks
Introduction to Search Engines
How does Google search engine work?
The architecture of Google search engine: You may like to read Introduction to search engines before we begin with this post. In Google Search engine, the web crawling is done by several distributed crawlers. There is a URL server that sends lists of URLs to be fetched to the crawlers. The web pages that are fetched are then… Read More »