Comparative Study of Security Algorithms IJTSRD
At present, through internet lots of confidential data is send across the world and though it is confidential it needs protection from unauthorized person who will try to read that data so to protect the data from unauthorized person security algorithms are used through which the original data can be able to convert into encrypted […]
A Comparison Study of Open Source Penetration Testing Tools IJTSRD
Penetration testing also known as Pen Test is a series of activities which is performed by authorized simulated attack on computer system, network or web application to find vulnerabilities that an attacker could exploit. It helps confirm the efficiency and effectiveness of the various security measures that have been implemented. In the world of Open […]
Li-Fi Security Issues and its Measures IJTSRD
As we see in today’s world, all institutes as well as organizations are planning to shrink the size hardware and are even trying to make it portable, olden days we had local area network wires to transmit data over devices then came in Wi-Fi which didn’t have wires but was able to transmit data over […]
A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques IJTSRD
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file […]
Foray Spotlight System IJTSRD
This Project “Foray spotlight system” is used for protecting the Computer from Malware attacks. It is a real time project and system security software which is used to identify the malicious activities in a computer. Malwares are the main problem for computers. Once it enters into the computer it will corrupt the files. Foray spotlight […]