Category: Tech Blog

Cold Casting 3D Prints

Designer Paul Braddock of the Mold3D Channel shows how to use objects, made with a 3D printer, to create silicone molds for casting items from a mix of metal powder and resin, giving them a sturdy and substantial part with a weathered metallic look with actual rust. Paul printed the model using FSL 3D (Full […]

Top Football Clubs Are Employing Cybersecurity Firms to Keep a Tab On Players’ Social Media Activities

Top Football Clubs are now employing Cybersecurity firms to scour Players’ social media activities to maintain their reputation. Take a look at some of these cases from the past: Former Sunderland footballer Adam Johnson was jailed for six years for grooming and sexual activity with a 15-year-old schoolgirl (evidence included messages and images sent over […]

What’s an Internet Troll & How Not to be One?

You may have heard of cyber bullies, but on the Internet there’s another type of people who are nasty and just short of being bullies. ‘Internet Trolls’ are people who post offensive or abusive messages towards other people online. The fact that they’re are invisible to other (physically) only makes them want to ‘piss off’ […]

Innovative megaphone breaks down language barrier, automatically translates Speech into various languages

megaphone translator

This ‘magic’ megaphone automatically translates Speech into various languages, breaks down language barrier. While knowing several languages is a great thing to have on your resume, and learning new languages is good for your brain’s development, many just don’t have the time (nor the inclination) to learn new languages. Well, for them, this is a […]

BYOD (Bring Your Own Device) Model

bring your own device (BYOD)

Pros & Cons of the BYOD (Bring Your Own Device) model! Is the hype surrounding the BYOD model justified? Future of BYOD Model Several tech companies are considering a “Bring Your Own Device” (BYOD) implementation within the next six to 12 months. The time seems ripe for a hard look at the implications of the […]

What is the ‘Deep Web’ & ‘Dark Web’?

‘Dark Web’ & ‘Deep Web’ Explained: The UK government had launched a dedicated cybercrime unit to tackle the Dark Web. Forbes has an article titled “Insider Trading on the Dark Web”. Dark Web Its a secret collection of websites that exists on an encrypted network which cannot be found using regular search engines or the […]

Best Wireless Network Router, Reviews

wireless router

Wireless Network Router Review – Your Guide to the Best Wireless Routers Reviews of the best Wireless Network Routers. Some routers now contain additional features like firewalls, parental controls, etc. Do you have multiple computers and laptops at home which need to be connected to the Internet? Do you want to avoid using cables to […]

Online Security More Critical as Internet Grows

Now that Snowden has spilled the beans, almost everybody is shocked that the National Security Agency conducted mass surveillance on millions of Internet and mobile phone users. But then the general public is now realizing that (which probably most governments had realized long before) the Internet is slowly turning into a medium with its own […]

Various Layers of TCP IP: Basics

Various Layers of the TCP/IP Reference model – Read about its functions, structure and uses. Various Layers of TCP/IP Physical layer: This layer incudes the actual physical aspect of the network i.e. physical data cables and telephone wires. Link layer: Almost all networks use Ethernet. Each machine in a network has its own IP address […]

What is Computer Forensics

Learn more on what is computer forensics, and why it has become an important part of solving criminal cases. Also read more on what skills it takes to become an expert in this area of computer science. The threats to computers are no longer limited to minor irritations like ad-popups, crashes or information thefts. Computers […]

What Is Steganography

Steganography is basically a data-hiding technique, its the art of hiding secret files or messages within seemingly harmless files (to avoid raising any suspicion). Steganography, in Greek, means “covered writing”. Uses of Steganography A piece of data or information hidden into a image or sound file is extremely difficult to catch. Steganography can be applied […]

Major Legal Issues Concerning Websites

Government in most countries feel the need to have checks on criminal activities, with due respect for human rights and civil liberties. In the process, many feel that they are also trying to regulate the content of the internet, which many find to be quite irksome. Though this is a separate debate in itself, what […]

Attackers Launch DDoS Attacks by Hijacking Insecure Surveillance CCTV cameras

surveillance cctv cameras

This may look like a scene straight from the movies, where attackers target insecure embedded devices connected to the Internet to launch attacks. Recently, security firm Imperva detected a distributed denial-of-service (DDoS) attack caused by overloading a resource on a cloud service, but the malicious requests came from surveillance cameras, instead of a typical computer […]

Drone Racing: Fast Becoming a Popular Sport

Drone racing is becoming a popular sport. You can see more and more people indulging in drone racing nowadays, and it looks as if the popular hobby may soon turn into a competitive sport. What is preventing drone racing from becoming an actual sport? The biggest barrier currently that prevents drone racing from becoming an […]

Page 1 of 212