About ArunKumar@TWC

Arun Kumar is a Microsoft MVP alumnus, obsessed with technology, especially the Internet. He deals with the multimedia content needs of training and corporate houses. Follow him on Twitter @PowercutIN
way-back-machine

How to view Archived or Cached web pages on the Internet

Sometimes you may want to see pages from the perspective of search engines. At other times, people may be offline and want to check some site. In still other cases, people might want to see an older version of their […]

Best Android Emulators for Windows 10 PC

Android is the leader when it comes to mobile operating systems. One in 3 smartphones runs Android – different versions. Naturally, most of the programmers and developers tend to create apps – messaging, communications, office automation, and games, etc. – […]

What is Email Spoofing & how to protect yourself & stay safe

Email Spoofing is a type of phishing. We all know about Phishing, how it works and how to avoid phishing. Basically, they are cybercriminals who tend to set up different types of baits with an intention to extract valuable information […]

cyberbullying

Cyberbullying Definition, Causes, Effects, Prevention

Bullying can take place anywhere – in schools, playgrounds, during transit to and from school, etc. While many schools have anti-bullying policies, technology has taken it to new levels. Cyberbullying is the method where the bullies and the bullied make […]

google rankbrain

What is the Google RankBrain algorithm update all about?

What is the Google RankBrain algorithm update all about & how does it work? How does this machine learning Artificial Intelligence (AI) affect SEO? In my previous article on facts and myths of Artificial Intelligence, I wrote about Strong AI […]

Website Traffic Fingerprinting

What is Website Traffic Fingerprinting? Is it dangerous?

We had earlier written on Browser Fingerprinting where it was possible for websites to know who is the person visiting them. Website Traffic Fingerprinting or traffic fingerprinting is a similar method. It allows third parties to snoop on you and […]

pastejacking

What is Pastejacking and How to protect yourself

The easiest method to obtain any text and images from a website is to select it, copy it using CTRL+C keys and then paste it using CTRL+V. What if the pasted material is not what you copied from the website? […]

Polymorphic Virus

What is a Polymorphic Virus and how do you deal with it

In spite of all the anti-virus programs in the world, the scope of malware attacks doesn’t seem to slow down on the Internet and from there, to your computers. What makes some virus undetectable even by the best anti-malware software? […]

email harvesting

Email Harvesting – Methods and Prevention

Email Harvesting makes use of Harvesting Bots to obtain email IDs en masse from online sources – although offline sources are also made use of. This post looks at Email Harvesting and Email Scraping, methods used by spammers to obtain […]

Microsoft Privacy Principles - Cloud

How to choose your Cloud Service Provider

More and more business houses and even individuals are moving to the Cloud because of the benefits they provide. At the least, cloud service providers offer remote storage accessible from anywhere. There are different types of cloud providers – SaaS, […]