Finance : Article explains power of Microsoft Word shortcut keys with our comprehensive guide. Increase productivity, reduce errors, and str...
CA, CS, CMA : Optimize your Order-to-Cash process in SAP S/4HANA to enhance efficiency, cash flow, and customer satisfaction with our comprehens...
Finance : Explore the power of automated billing software in driving business growth, increasing efficiency and simplifying your billing pro...
Finance : Discover the step-by-step process of Enterprise Risk Management (ERM) in organizations, from risk identification to continuous mon...
CA, CS, CMA : Discover the process of acquiring a .edu domain, its benefits, importance, and how it distinguishes educational institutions onlin...
Finance : AVIF is an optimized open-source image format popular among photo editors. It can be a single image or a sequence of images stored...
Income Tax : Discover how CA-TDSMAN revolutionizes tax compliance for Chartered Accountants and Tax Professionals, fostering seamless collabora...
Corporate Law : Centre today established three Grievance Appellate Committees based on the recently amended Information Technology (Intermediary G...
Corporate Law : It has been observed that Indian banking customers are being targeted by a new type of phishing attack using ngrok platform. The m...
Corporate Law : In a strong communication sent to Union Minister Shri Ravi Shankar Prasad, Confederation of All India Traders (CAIT) has reiterate...
Income Tax : Read the detailed analysis of ITAT Delhi's decision to delete additions made on cash salary payments without proper documentation ...
Income Tax : ITAT Hyderabad held that payments made for making use of shrink wrap computer software wherein there is no transfer of any copyrig...
Corporate Law : A surge in use of data wiper malware by nation sponsored threat actors is being reported. The Primary motive of the attacker for u...
Corporate Law : A password represents a shared secret between the end user and the system they are authenticating. The system cannot differentiate...
Fema / RBI : Fraudsters attempt to get confidential details like user id, login / transaction password, OTP (one time password), debit / credit...
India IPV6 Task Force Newsletter and Compendium on IPV6 Activities Released. Sh. R Chandrashekhar, Secretary (Telecom) released the first India IPv6 (Internet Protocol IPv6 )Task Force Newsletter and technical compendium on IPv6 activities at a function held in Sanchar Bhawan on the occasion of World IPv6 day, 8th June, 2011. Sh. S. C. Misra, Member (S), Smt. Sadhana Dixit, Member (Finance), Sh.J.Gopal, Advisor (T) and other senior officers of DoT, TEC, DIT, BSNL and MTNL were also present.
A new online tracking system will allow websites to pinpoint your location to within a few hundred metres, without your permission. Internet sites will be able to work out where users are within an average of 690 metres, using information about their internet connection. At the moment they can only track users’ locations to within a radius of about 200 km, but the new technique will narrow this down to as little as 100 metres, the Daily Mail reports.
Each time you open a new Word file in Microsoft Word, from now on, there won’t be any need to save your work every few seconds, for fear of losing all your data with a power cut or a computer hang. Google’s newly launched Cloud Connect toolbar for Microsoft apps, sits inside a MS Word, Excel, or Powerpoint application.
With Nokia succumbing to pressure and recently setting up its email server in New Delhi for government authorities to snoop, the Union Home Ministry, which has tasted blood, is now exerting pressure on Google Inc to share Gmail’s encryption keys.
It’s coming to the end of 2010, and it may be coming to our mind that what to expect in terms of new threats and related trends in 2011. I have to say that I don’t see total revolutions in the threats – just continuing evolutions of the same threats
Sh. Sachin Pilot, the Minister of State for Communications and Information Technology held a meeting with officers of the Department of Information Technology, the Ministry of Home Affairs, Indian Computer Emergency Response Team (CERT-In), National
Scientists have developed a new web application which they claim could stop one from writing e-mails or posting messages on social networking sites, like Facebook and Twitter, when drunk. Once installed, the software, known as the Social Media Sobrie
Google’s methods for Internet search and ranking of websites are being scrutinised by the Texas’s Attorney General — yet another case of authorities closely looking at the core business of the company. The Attorney General’s move comes in the wake
Do you remember those “Oops” moments when you send email to someone and soon it occurs that you have missed something? This is where the “Undo Send” feature of Gmail comes in. It has saved me several times by undoing the sent emails.
The availability of password-cracking tools based on increasingly powerful graphics processors means that even carefully chosen short passwords are liable to crack under a brute-force attack. A password of less than seven characters will soon be “hopelessly inadequate” even if it contains symbols as well as alphanumerical characters, according to computer scientists at the Georgia Tech Research Institute. The security researchers recommend passwords at least 12 characters long.