28: LASER GUNS ON AIRBORNE PLATFORMS

Aerial warfare started with pilots shooting hand held weapons at each other from their aircraft. The aircraft mounted guns replaced these hand held weapons. The aircraft guns improved over the years in terms of the caliber of weapons, rate of fire, ammunition carrying capacity and most important the lethal range. Improvements also took place with respect to the arc of fire, cone of fire and the aiming systems. The aerial combat and the tactics kept changing depending upon the capability of these weapon systems.

Gradually longer range air to air missiles became the weapon of choice for airborne platforms. These missiles advanced from close combat ones to all aspect beyond visual range weapons. The nature of warfare and the tactics underwent a drastic change with these weapons.

The airborne platforms including fighters and combat support heavy aircraft have become vulnerable to modern weapons fired from far ranges. With introduction of hypersonic weapons the reaction time will reduce further increasing their vulnerability.

Continue reading “28: LASER GUNS ON AIRBORNE PLATFORMS”

27: THINK BEFORE CLICKING – Cyber Security: DOs & DON’Ts

DOs

  • Have a strong Password
  • Change password often ( every 15 days)
  • Use Licensed software
  • Use good anti virus.
  • Update regularly with patches.
  • Back up your data and documents
  • Avoid cyber cafes for financial transactions
  • Download from trustworthy sites
  • Configure email to be secure
  • Disable auto opening of documents
  • Use two step authentication for online services
  • Have different account & username for multiple users of same device
  • Check social network configuration
  • Use parental control tools for browsing

DON’Ts

 

  • Click on suspicious or unknown links
  • Use pirated software
  • Share confidential information
  • Share pins and passwords
  • Reply to Spam  messages
  • Ignore updates
  • Leave storage devices outside unattended
  • Share email with unknown individuals
  • Use simple guessable passwords
  • Keep webcam connected when not in use
  • Use same password for different applications or accounts
  • Open suspicious attachments