Sunday, July 25, 2021

admin

28 POSTS0 COMMENTS
https://tekphilia.com

Social engineering

In computer security, social engineering is the malicious technique of psychological manipulation that exploits the online behavior of the users to deceive...

USB drive

A USB drive is a portable flash memory device that is integrated with a USB interface and is used to transfer and...

Phishing

Many internet users have once experienced hoodwinking from unscrupulous individuals deceiving them to provide relevant personal information across the web such as...

External hard drive

A hard drive or hard disk is a non-volatile data storage device that has one or more rotating platters that are enclosed...

Google ads account

The Google ads account enables users to create accounts and set up tailored ad campaigns based on time, images, budget including other...

Distributed denial of attacks

Technological development continues to shape our lives and enhances efficiency in almost every sector. However, cyber-attacks have become a real challenge preventing...

Primary storage devices

The primary storage devices are internal memory in a computer that holds what a user is working on for a short period....

Secondary storage devices

Secondary storage technology refers to the storage devices and media that can hold data unless it is deleted or overwritten. It is...

TOP AUTHORS

28 POSTS0 COMMENTS
0 POSTS0 COMMENTS
- Advertisment -

Most Read

Apple Inc history.

Apple Inc, (AAPL) was formerly known as Apple Computer Inc. Based in the U.S.A and with branches across the world, the company...

Amazon Web Services

Amazon Web Services can be described as an evolving cloud computing platform that is provided by Amazon. It has a combination of...

Facebook Ads

Do you know that an average Facebook user clicks 12 ads per month? The marketers use Facebooks ads to achieve these objectives:...

Google

An interesting fact about Google is that it has the largest index of websites globally. The institution that is considered one of...