Posted in Uncategorized

Future of technology

“Technology” is a widely used term used all across the globe , but have you ever wondered how much it would influence all of us in the future? Have you ever thought of it while enjoying your coffee? Hmm…maybe. There is a strong possibility that the future of technology would be more brighter than our needs.

But there is a problem here, like Every coin has two faces, similarly technology can be used for the improvement of human life or as a spy in our personal life, it is all divided into two parts; black hat and white hat, the white hatted ones are the cyber protectors and the black hatted ones are the cyber threateners.

We use technology everyday in every form of life starting from a debit card payment to the car we drive to our office. There is a very weak possibility of the future without tech, Technology is growing very fast and new things are discovered everyday, we can get an idea of the expansion of tech by the fact that technology increases by 10.48% each year

Technology has changed how we entertain ourselves, meet each other, and consume all types of media. It’s made fun advancements, but it has also made important advancements in safety when it comes to home security and medical devices, However, all of these new technologies are designed to make our life easier.

Every twelve to eighteen months, computers double their capabilities, and so do the information technologies that use them, this might be quiet shocking but true. Someone once said that “Technology makes us think that it improves our quality of life without actually improving it”.

Sharing of experiences has been made easier. With social media platforms, you can actually share pictures with your loved ones and friends. Nowadays, you can also buy items online unlike before. In addition, computer technology has brought a lot of flexibility.

by 2020, IoT technology will be in 95% of electronics for new product designs. And by 2050 it is expected to have everything connected to the cloud and to the internet.

Visit our website : technosavage.code.blog Instagram : @_techno_savage

Posted in technology, Uncategorized

COMPUTER VIRUS

You might have heard of many Cyber attacks , online Frauds black hat hacking etc , In this globe filled with technology we come across many things and one of them is a “COMPUTER VIRUS” and you might be shocked to know that these viruses generally used by all the black hat hackers to hack someone’s device .

So you you now that computer viruses are dangerous but do you know how much of a computer virus if enters in your computer/mobile can format your phone, send messages to others, make phone calls or even use it as a medium for various kinds of illegal activities and do much more.

A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions. … It can self replicate, insert itself onto other programs or files infecting them in the process. In simple words it is a computer program that is programmed in such a way which causes destruction of data and much more.

So till now you have seen that viruses only cause destruction and there would be some questions which you might be thinking of like how can we prevent our computer from getting infected and what are the preventive measures that we can take to avoid these viruses.

For avoiding a computer virus the best way is to use an antivirus, it acts as a guard for your device so no virus can enter your device and infect it .

There some preventive measures which you should take to avoid a computer virus infecting your device 1. Keep Java, Adobe Flash and Acrobat Reader updated at all times, or uninstall them if you do not use them 2. Always be cautious with the programs you install or run 3. Always Keep your Windows OS Updated 4. Use an effective antivirus and keep it updated at all times

At times, we need to scan a particular pen drive, URL, files etc and your antivirus does not support it so to stay protected you can use a website called virus total which scans your files for free and using multiple antiviruses it clears your device from any virus that may have been present in that file “HOPE THIS HELPED YOU”

VISIT OUR WEBSITE : technosavage.code.blog INSTAGRAM : @Techno_Savage_

Posted in Uncategorized

INTERNET EXPLAINED

“Internet” a common term that we usually come across frequently , but did we ever think about what it actually is , who discovered it and who made it practical , So in this blog i would be telling you about some unknown facts and i would be trying my best to explain internet in very very simplified way.


  1. So basically internet is a global network connected all across the globe and serves a huge part in the security of the country it can even be called as the brain of the country . All including from online shopping , social media to cyber security and ethical hacking everything is a part of internet .

2. All the websites , pages or anything you can access in the internet using different search engines or something that is not hidden is called the surface web of the internet and you might be shocked to to know that the surface web is only the 4% of the whole internet. so what does the other 96% of the internet consist of ? The 96% consists of the deep web and the dark web which is not accessible to a normal person or in other words it is the censored data that everyone cannot access it needs a special URL and a special browser to access it and the data which is available on the the deep web and the browser which used to access the deep and the dark web is untraceable which means no one can trace that network , The dark web is such a place where every illegal work that you can think of, happens .


3. Its illegal to access the deep and dark web without permission, only special ethical/white hat Hackers are allowed to access the deep web and some of them get it illegally , So its a request not to access it this was just for informative purpose “HOPE THIS HELPED YOU”


VISIT MY WEBSITE : http://technosavage.code.blog

Posted in Uncategorized

Why password ?

Many of us in professional life of or in any other field have some sensitive data which all of us don’t want others to access.

It can be your professional sensitive data which you cannot share with others, and even it can be your plan for your new startup which you have been preparing since long.

For protecting all this data from others to access the best way is to insert a “Password” Nothing but “A string of characters used for authenticating a user on a computer system” that’s what google says , inserting a password on a folder is next step to increase your privacy.

When we come across the the topic “password awareness” we usually come to see a very shocking but real fact that 90% of the android users don’t even change their WiFi password and just use the default one and some who wants to access your WiFi can just have a quick search on google “default passwords for WiFi” and crack your password.

In many cases many of us keep a password which is not easy to remember of complex it is strong and nobody can easily guess it but even it is difficult for you to remember it , So you should try to relate passwords with a thing that is close to you , A research says that people usually remember three types of things easily , first : Something that is close to you Second : something that you want Third : something that you feel cheap So you should try to relate your password with something of these three so can remember it for long .

You should even try to use a single password for multiple files and try to create a link between password and data . even you should notice that you keep your password complex and memorizable . you should even link a Gmail address so in case you forget your password you can verify that its you and recover your sensitive data .

PROS 1 – Humans can be unreliable as they can come up with bad passwords, forget their password, or are genuinely disinterested in security. 2 – With a PM there is no need to worry about remembering all your different passwords.
3 – Using the same credentials for each account is dangerous as it creates one point of failure.
4 – Good password managers encrypt all your personal data in case someone hacks the PM software directly; the hacker might get your passwords but they won’t know who the passwords belong to.
5 – PMs can keep you up to date with the latest breaches and advise you if any accounts may have been affected/hacked.
Can use offline password manager (not stored on the web/not a web browser plugin).

Humans can be unreliable as they can come up with bad passwords, forget their password, or are genuinely disinterested in security. With a PM there is no need to worry about remembering all your different passwords.
Using the same credentials for each account is dangerous as it creates one point of failure.
Good password managers encrypt all your personal data in case someone hacks the PM software directly; the hacker might get your passwords but they won’t know who the passwords belong to.
PMs can keep you up to date with the latest breaches and advise you if any accounts may have been affected/hacked.
Can use offline password manager (not stored on the web).
CONS 1 – Single point of failure – if someone gets hold of your master password, they have all your passwords.
2 – Password manager programs are a target for hackers.
It’s not easy to login using multiple devices.
3 – If the main password is used/typed/saved on a computer with malware, your main password can compromise all your other passwords controlled by the PM – all your passwords are only as secure as your master password.
4 – Not all PM’s are adequately encrypted which can render the whole process of setting one up useless.

MY WEBSITE : technosavage.code.blog