Search

Advanced Search

Technology

Showing 251 to 255 of total 261 records

Broadband Over Powerlines: A Paradigm Shift

Sambit Kumar Panda
  |   July 2009

An emerging technology may be the newest heavy hitter in the competitive world of broadband Internet service. It offers high-speed access to your home through the most unlikely path: a common electrical outlet. With broadband over power lines, or BPL, you can plug your computer into any electrical outlet...

Salted Hashing of Passwords

Snigdha Acharya
  |   July 2009

During the course of Penetration testing of Web Applications at Cyber Security Division, NIC, several security vulnerabilities are identified. One of these vulnerabilities includes the finding that the credentials traveling in clear text can be sniffed from the network. The credentials can also be detected...

Guidelines for Indian Government Websites

Neeta Verma, Lokesh Joshi
  |   April 2009

Web enablement of citizen services is one of the focus areas of NeGP (National e-Governance Plan). Communication and literacy expression are the key indicators of a successful relationship and websites are the first point of interface in building these relationships. They also facilitate an efficient...

MIS for Indira Gandhi National Old Age Pension Scheme

Anubha Goyal
  |   April 2009

Indira Gandhi National Old Age Pension Scheme is introduced by the Ministry of Rural Development, Govt. of India to provide a steady monetary assistance for all man and women of India above the age of 65 years of age and below poverty line. In addition to the existing IGNOAPS scheme, the Govt. Of India...

Network Access Control and End Point Compliance

Seema Khanna
  |   April 2009

Cybercrime continues to rise, with the primary aim to compromise an organisations information that will make a profit for the perpetrators. To avoid the unwelcome publicity provoked by IT failures, securing the network is more important today than ever before. It's also tougher to achieve, as today's...

Recent Issues

Highlights

Jan. ' 24 Issue


Cyber Risk Insurance Insurance Policy to cover financial liabilities arising from cyber incidents

Cyber Risk Insurance, also simply known as Cyber Insurance, is a kind of insurance policy which protects business ...


SATHI An ecosystem where each seed tells its own story

SATHI, or Seed Authentication, Traceability & Holistic Inventory, strives to create a nurturing digital environment. ...


Unified Data Hub Empowering Proactive Governance through Integrated Solutions

UDH has established an adaptable system for validating and eliminating duplicate beneficiaries. Presently, it encompasses ...

Oct. ‘ 23 Issue


Emerging AI/ML Attacks and Risks Navigating Emerging AI/ML Threats in Application Security

In the era of relentless innovation driven by Artificial Intelligence (AI) and Machine Learning (ML), applications ...


Advanced Persistent Threats Threat Landscape and Countermeasure

In the digital age, Advanced Persistent Threats (APTs) pose a persistent and evolving menace. APTs, orchestrated by ...


TejasVI Empowering Data Driven Governance

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jul. ' 23 Issue


HTML Canvas & Fabric.js Open-source 2D Geometry Rendering JavaScript Library

Fabric.js is an open source 2D graphic library which can be used to give attractive visual effects,design, ...


REST vs. Messaging for Microservices Discover how to choose the right communication style for Microservices

Two common protocols used in microservices are HTTP request/response with resource APIs and lightweight asynchronous ...


SugamyaWeb Enabling accessible web experience of the Indian Governments websites

SugamyaWeb is a cloud enabled Web Accessibility reporting platform, which provides end-to-end web testing. The tool ...