About ArunKumar@TWC

Arun Kumar is a Microsoft MVP alumnus, obsessed with technology, especially the Internet. He deals with the multimedia content needs of training and corporate houses. Follow him on Twitter @PowercutIN
Bluetooth Radiation

Is Bluetooth Radiation harmful to humans or is it safe?

When writing about cell phone radiation, we said that it is better to use a wired or Bluetooth device so that you are not affected by cellphone radiation. Questions arise that since Bluetooth communication too, is a form of radio […]

bios whitelist

What is a BIOS Whitelist? Explanation and removal.

In this post, we will discuss what a BIOS Whitelist is, what is its use, and how to remove it. In short, a BIOS whitelist is essentially a list of hardware approved for use in that computer – if you […]

get free WiFi anywhere

How to get free WiFi anywhere on laptop or phone

There may be many reasons for seeking a free WiFi or hotspot. Maybe you are on a limited plan on your cell phone, so you want WiFi to spend less on mobile data. It may also happen that the place […]

dispose of electronic devices

How to properly dispose of electronic devices

You might already have heard of the term ‘electronic waste‘ and the damage it does to the environment. This article is not about the waste and damages to earth. Rather, it focuses on the security of your data. That means, […]

internet live statistics

Internet Live Statistics that you can use

If we are to believe a website titled Internet Live Stats, at least one website goes online every second. Internet Live Stats is a website that has many different counters, each one displaying different information for a number of curious […]

Device Driver Types

What is a Device Driver? What is its purpose?

Device Drivers are the software through which, the kernel of a computer communicates with different hardware, without having to go into the details of how the hardware works. It is a software that controls a hardware part attached to a […]

Google Chrome vs Mozilla Firefox

Google Chrome vs Firefox Quantum on Windows 10

Which one is better for use on Windows 10? Chrome or Firefox? We discuss the main points to find out what are the key differences in Google Chrome & Mozilla Firefox Quantum web browsers. No tests were carried out. This […]

Laptop Radiation

Laptop Radiation – Truth or Myth; How to protect yourself?

As with any radio signal based electronic devices, laptops too emit harmful electromagnetic frequency (EMF) waves that can be dangerous to users. Another danger from laptops is the amount of heat we absorb while working on it. Thankfully, there are […]

Edge Browser

Edge vs Firefox: Which is better for Windows 10?

Both Mozilla Firefox and Microsoft Edge have come a long way since Edge was introduced with Windows 10, a few years back. Windows 10 gives you Edge as the default browser. We had earlier covered which browser is better for […]

PhishTank report Phishing

PhishTank will help you verify or report Phishing websites

PhishTank is a project from OpenDNS that aids in checking out websites that attempt Phishing. OpenDNS is a service that offers both domain name resolving service as well as blocking websites that are suspected as phishing domains. PhishTank is a […]

cold-boot-attack

What is a Cold Boot Attack: Explanation and Staying Safe

Cold Boot Attack is yet another method used to steal data. The only thing special is that they have direct access to your computer hardware or the whole computer. This article talks about what is Cold Boot Attack and how […]

05_Revoke app permissions from Microsoft

Remove 3rd-party App access from your online accounts

I was casually going through my Facebook Settings when I noticed that over 80 apps have permissions to use my Facebook data. “Good for them,” I thought to believe more than half of them would be selling off my data […]

Password Spray attack

Password Spray Attack Definition and Defending yourself

The two most common used methods to gain access to unauthorized accounts are (a) Brute Force Attack, and (b) Password Spray Attack. We have explained Brute Force Attacks earlier. This article focuses on Password Spray Attack – what it is […]

How to install Windows 10 on Raspberry Pi 3

The Internet of Things is a collection of interconnected smart devices. When a device is connected to the internet to enhance its abilities, it is called a smart device. Smart devices come in various sizes – as small as a […]

Attack Simulator office 365

What is Office 365 Attack Simulator? How to use it?

If you are using Office 365 Threat Intelligence, you can set up your account to run simulations of real-time phishing and brute force attacks on your corporate network. It helps in preparing for such attacks in advance. You can teach […]