History of Linux Timeline

How Linux born? Is it coming from Unix?  Here is a brief Linux history timeline. Let’s Start. 1968 E.W. Dijkstra develops MULTICS (Multiplexed Information and Computing Service), a time-sharing operating system in the Netherlands. 1968 Bell Telephone (AT&T) lab researcher Ken Thompson developed a new system using MULTICS. His co-worker Brian Kernigham dubbed it UNICS(Uniplexed

EMV Chip Card Technology

Today when i was busy with my work suddenly received a message on my phone asking me to contact with my bank branch immediately to migrate my debit card into EMV Chip-Based card. I am using my debit card from a long time ago but never changed or replaced it yet. But as it is

How Internet Content Filtering works to restrict website access

Internet content filtering is a very useful method to restrict access to any harmful link or website on the Web. Content filtering can block access to certain websites like; gambling websites, pornographic websites, drugs and child abuse sites, malware sites or links, which may contain viruses or harmful links. Also, by using web content filtering

How to Choose a Trusted Mobile App

Here are some simple and quick tips to choose a trusted and authenticate mobile app. Today almost everyone is using smartphones. And people have many mobile applications (apps) installed on their smartphones. Some Mobile apps like; Facebook, Twitter, Amazon, Flipkart, and some other online payments apps come with pre-installed on every phone. But beside these

Why You Should Activate Google Two Step Verification

2 step verification for your google account is a great security feature for protecting your online data that linked with Google products like; Gmail, Google drive, Playstore and others. By using 2 step verification you can not only protect your password but can protect your device also. If you are thinking that your password is

How VPN Works

VPNs actually extends a private network across a public or shared network. Using VPNs user can send and receive data securely and anonymously across the internet. In real life VPNs are typically used for mainly two reasons; 1. By using VPNs an employee can access the company’s private network (intranet) from home or any geographical