Home Page > Internet Business > Archive for the ‘Security’ Category
Sort by:

Cyber Bullying Articles – Show Incidents Have Quadrupled

May 11, 2011 | Author: | Posted in Security
Cyber Bullies The number of households with access to the Internet is increasing all the time. Many articles have been written of the affect this is having on everyday life of adults and their children. As a saturation point approaches and cell phone users expand beyond one hundred million, so do the opportunities for cyber ...

Asymmetric Encryption – Public and Private Encryption

May 2, 2011 | Author: | Posted in Security
Asymmetric Encryption Algorithms Different keys are used for encryption and encryption in the process of asymmetric encryption, however, it is a normal practice to arrange “key-pairs”, to enable each user in a network, to possess a public as well as a private key. The public key as its name implies, is made available to each ...

Cyber Bullying Facts and Affects

May 1, 2011 | Author: | Posted in Security
There are probably many people who have a perception that cyber bullying is something that makes a good, scary movie. This is far removed from the truth, as any victim of a cyber bully will tell you. Why any so called normal person would take time to design and plan how to terrorise a stranger ...