Information Technology for UPSC Exams

December 15, 2013


Li-Fi or Light Fidelity is a technology for fast and cheap wireless-communication system based upon light. The term was first used by Harald Haas. In this technology, Light Emitting

December 15, 2013

Near Field Communications

Near Field Communications (NFC) is a short-range wireless technology that allows mobile devices to actively interact with passive physical objects and other active mobile devices, connecting the physical world

December 15, 2013

Traditional Knowledge Digital Library (TKDL)

India possesses a rich traditional knowledge which is generally being passed down by word of mouth from one generation to another. Most part of this traditional knowledge is inaccessible

December 15, 2013


The UPA Government had initiated the Crime and Criminal Tracking Network System (CCTNS) project in 2009 as part of its police modernisation programme under the national e-governance project. It was

May 30, 2012


Iran reported substantial damage and huge data lost due to malicious software dubbed as Flame. It could be 3rd most powerful virus after Stuxnet and Duqu viruses. Largest number

November 20, 2011


Creation of living and working spaces which are a harmonious blend of technology, multimedia, intelligent systems and user interactivity, that is Cyber + Architecture. These spaces can be customized

November 20, 2011

Spoofing in IT

Making an e-mail message appear to have come from one place when really it comes from another is called spoofing. It is generally used by spammers, who do not

November 20, 2011

Google Panda

Google Panda refers to the change introduced to the search algorithm used by Google in 2011, to give better search results. The change aims to lower the rank of

November 20, 2011

Google Bomb

A Google bomb is an effort to inflate a website’s search ranking for a particular term. Google gives importance to pages linking to a particular page for ranking purposes.

November 20, 2011

Website Pharming

Pharming involves rerouting the traffic of a particular website to a bogus one. This is done by exploiting the weaknesses of the site’s Domain Name System (DNS) server. Pharming