Radio Frequency Identification 1

RFID stands for ‘Radio Frequency Identification’. It is short range communication system. An RFID consist of three main parts an antenna, transponder and a receiver. It is used to transfer data and is transferred through electromagnetic and electrostatic coupling. Data size can range from 2000 bytes and less. RFID system uses tag for identification of object. It consists of radio frequency transmitter and receiver. These tags contains unique tag serial […]

RFID Reader

Wi-Fi EAP

What is WI-FI? 2

Wi-Fi is a Wireless technology that uses the radio frequency to transmit data through air. With the rise of Wireless Fidelity (Wi-Fi), technology comes the rise of the hotspot -public access Wireless Local Area Networks (WLANs) that allow anyone with a Wi-Fi capable notebook or PDA to connect to the Internet or a corporate intranet in airports, hotels, coffee shops, or even campgrounds and fast food restaurants. Wi-Fi hotspots are […]


ToolChain

A Toolchain is the set of Programming Tools that are used to create software. The Tools are used in a chain , so that the output of each tool becomes the input for the next tool.   Editor: Editor is program in which we can write our code and edit that code. Gedit , kwrite are the examples of editors.   File name : Demo.c #include<stdio.h> #define MAX 10 int […]

Tool Chain

computer virus

Computer Virus 2

Introduction to Virus   A machine infection is a workstation system that can reproduce itself and spread from one machine to another.[1] The expression “infection” is additionally ordinarily, however incorrectly, used to allude to different sorts of malware, incorporating yet not constrained to adware and spyware modifies that don’t have a regenerative capacity.  Malware incorporates machine infections, workstation worms, ransomware, trojan steeds, keyloggers, generally rootkits, spyware, untrustworthy adware, pernicious Bhos […]


Cyber Crime in India 6

               Cyber crimes are crimes in which the computer is either an “object or subject of the conduct constituting crime.” Computers are easy to access and store a lot of data in a small space, which make them vulnerable to criminals. Cyber criminals may include children, adolescents, professional hackers, resentful employees, etc. The BAL Bharati case in Delhi is an example of a cyber crime committed by a juvenile. Harassment […]