Providing Security to Social Media using Unique Identification IJTSRD
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, Myspace, or Twitter), storing and sharing a wealth of personal information. This information, as well as the possibility of contacting thousands of users, also attracts the […]
Spy Detection for Android Devices IJTSRD
This paper proposes a procedure to enhance anti- theft to prevent robbery for android-based smartphones by utilizing SMS as a medium. As the usage of phones, tablets, note pads are designed with the help of android OS is drastically rising and expanding, numerous situations related with anti- theft have additionally been evolved, however the greater […]
SQL Injection Attack Detection and Prevention Techniques to Secure Web-Site IJTSRD
Structured Query Language (SQL) Injection is a code injection technique that exploits security vulnerability occurring in database layer of web applications [8]. According to Open Web Application Security Projects (OWASP), SQL Injection is one of top 10 web based attacks [10]. This paper shows the basics of SQL Injection attack, types of SQL Injection Attack […]
Security Threats in Indian Cyberspace by Social Media and Cyberhoaxes IJTSRD
This study examines the proliferation of hoaxes and hate speech through websites and social media in India. Such provocative content utilizes sectarian issues to attack its creators’ political opponents. This study finds that hate has been politicized and hoaxes have been commodified, both for economic and political interests, in Indian cyberspace. There has been a […]
Software Piracy Protection IJTSRD
Software piracy by users is generally believed to harm both software firms through lower profits and buying customers through higher prices . Thus, it is thought that perfect and cost less technological protection would benefit both firms and consumers. The model developed here suggests that in some circumstances, even with significant piracy, not protecting can […]