Posts

Showing posts from 2017

What is MD5 or Message Digest 5 Algorithm

Image
We are getting many requests  through emails, messages and on social media people are very much confused asking about how there passwords gets encrypted , and how does this encryption works, what are the algorithms used behind this encryption. So here i am going to tell you about one of the most widely used algorithm used for encryption known as MD5 or Message Digest Algorithm        Before we proceed to MD5 i want to tell you something about Cryptographic Hashing. Cryptographic Hashing MD5 stands for M essage D igest algorithm 5, and was invented by celebrated US cryptographer Professor Ronald Rivest in 1991 to replace the old MD4 standard. MD5 is simply the name for a type of cryptographic hashing function Ron came up with, way back in ’91. The idea behind cryptographic hashing is to take an arbitrary block of data and return a fixed-size “hash” value. It can be any data, of any size but the hash value will always be fixed.  Cryptograp...

Everything you Should Know About an IP-Addresses

Image
                                          You have heard of this term IP Address many times in day-to day life if you belong to IT sector, yes as soon as you heard about the term IP only one thing that stucks in your mind is the IP of a computer which you people might have seen. But what this IP actually is….?? IP address, or “internet protocol address”, is a unique identifying number given to every single computer on the Internet. Like a car license plate, an IP address is a special serial number used for identification. NOTE:- An IP Address is different from a MAC Address or an Domain Name address Any machine connected to the Internet has an IP address  Xbox games, cell phones, fax machines, and even soda pop dispensers have IP addresses. In every case, the IP ...

How Cloud Computing Works.

Image
                               Let’s say you’re an executive at a large corporation. Your particular responsibilities include making sure that all of your employees have the right hardware and software they need to do their jobs. Buying computers   for everyone isn’t enough — you also have to purchase software or   software licenses   to give employees the tools they require. Whenever you have a new hire, you have to buy more software or make sure your current software license allows another user. It’s so stressful that you find it difficult to go to   sleep   on your huge pile of money every night. Soon, there may be an alternative for executives like you. Instead of installing a suite of software for each computer, you’d only have to load one application. That application would allow worke...

What are Virtual Machines..?

Image
A virtual machine uses a combination of software and your existing computer to emulate additional computers, all within one physical device. Virtual machines provide the ability to emulate a separate operating system (the guest), and therefore a separate computer, from right within your existing OS (the host). This independent instance appears in its own window and is typically isolated as a completely standalone environment, although interactivity between guest and host is often permitted for tasks such as file transfers. Everyday Reasons For Using a Virtual Machine There are many reasons why you may want to run a VM, including developing or testing software on various platforms without actually utilizing a second device. Another purpose could be gaining access to applications that are native to an operating system different than your own. An example of this would be wanting to play a game exclusive to Windows when all you have is a Mac. EntSennheiser ...

Details about Java Virtual Machine you mus know.

Image
                             JVM is an specification that provides run-time environment in which java byte-code can be executed. JVMs are available for many hardware and software platforms (i.e. JVM is platform dependent). What is JVM It is: A specification where working of Java Virtual Machine is specified. But implementation provider is independent to choose the algorithm. Its implementation has been provided by Sun and other companies. An implementation Its implementation is known as JRE (Java Runtime Environment). Runtime Instance Whenever you write java command on the command prompt to run the java class, an instance of JVM is created. What it does The JVM performs following operation: Loads code Verifies code Executes code Provides runtime environment JVM provides definitions for the: Memory ar...

Virus VS Malware

Image
Difference Between Viruses and Malware These days many of us talk about like malware and spyware a lot more than the virus. Have you ever wondered what exactly are all these? Beginning with to understand what a virus is we will start with the original biological meaning of the word.                                                                                                         Biological viruses like the ones that can make you sick are parasitic. They in...

How does an Image Sensor Chips and Camera Works.

Image
All webcams work in broadly the same way: they use an image sensor chip to catch moving images and convert them into streams of digits that are uploaded over the Internet. The image sensor chip is the heart of a webcam—so how does that bit work? Let's take a webcam apart and find out. Take the outer case off a webcam and you'll find it's little more than a plastic lens mounted directly onto a tiny electronic circuit board underneath. The lens screws in and out to increase its focal length, controlling the focus of your cam:                                              Now take the lens off and you can see the image sensor (CCD or CMOS chip): it's the square thing in the middle of this circuit. Only the tiny, green-colored central part is light-sensiti...

Everything You must know About the BITCOINS.

Image
A few days ago, the world has seen the biggest Ransomware attack called WannaCry. The hackers encrypted all the information of victims and asked for Bitcoins to decrypt the data. You may wonder why hackers asked for Bitcoins instead of dollars or euro? What is Bitcoin and Bitcoin mining? What is the reason for asking Bitcoins? In this article, I am going to share everything you need to know about Bitcoins and how do they work. What is a Bitcoin? Bitcoin is the virtual banking currency of the internet also known as ‘cryptocurrency’. It is the world’s “first decentralized digital currency”. A mysterious person known as Satoshi Nakamoto launched bitcoin in 2009. His true identity is still unknown. It has existed for several years now and many people have questions about them such as Where do they come from? Are they legal? Where can you get them?. Bitcoins are digital coins, you can send over the internet. Compared to other choices, bitcoin have ...

Amazing Use of OTG Cable that you might don't Know.

Image
                                                    USB OTG or the OTG cable is also known as USB On-The-Go cable is the cable which allows USB devices to act as a host which further allows USB devices to be attached with them. The OTG cable is generally used extend the device’s functionality, which allows you to transfer the data from the smartphone to Pen Drive and vice versa. But, there are other interesting uses of the OTG cable which we will figure out in the article below. Connect a portable hard drive You can connect the external hard drive to your smartphone with the help of OTG cable. Once the external hard drive is connected, you can easily access all the files on your smartphone. Also, you can transfer the fi...